General
-
Target
920-55-0x0000000000810000-0x0000000001874000-memory.dmp
-
Size
16.4MB
-
Sample
230228-vvdhnacd82
-
MD5
c332d2c28f0f12d56f63d9f3e5bd737e
-
SHA1
1cb3c1a4d83abd582561839885317832b80d9701
-
SHA256
656f171546dd818bc4ecbd10397c1993b0485017b5e4e841effc5e663f291827
-
SHA512
27e6c1eb04c7e3f98731f8b4596229a4ffa588592258b4e8764f807302df9df2f44906b1ce2d8c4693f7917ff1d273d2d842745ef4ea542e71da75e3d8b1d80c
-
SSDEEP
393216:euEKRCOqXnU6lzje+CtrDXXTUPSPS4qTZ/wJ+F0a8b96:eu/qXlTZ8bXbE
Behavioral task
behavioral1
Sample
920-55-0x0000000000810000-0x0000000001874000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
920-55-0x0000000000810000-0x0000000001874000-memory.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
loaderbot
http://92.204.173.86/cmd.php
Targets
-
-
Target
920-55-0x0000000000810000-0x0000000001874000-memory.dmp
-
Size
16.4MB
-
MD5
c332d2c28f0f12d56f63d9f3e5bd737e
-
SHA1
1cb3c1a4d83abd582561839885317832b80d9701
-
SHA256
656f171546dd818bc4ecbd10397c1993b0485017b5e4e841effc5e663f291827
-
SHA512
27e6c1eb04c7e3f98731f8b4596229a4ffa588592258b4e8764f807302df9df2f44906b1ce2d8c4693f7917ff1d273d2d842745ef4ea542e71da75e3d8b1d80c
-
SSDEEP
393216:euEKRCOqXnU6lzje+CtrDXXTUPSPS4qTZ/wJ+F0a8b96:eu/qXlTZ8bXbE
Score10/10-
LoaderBot executable
-
XMRig Miner payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-