General
-
Target
5bc457579941e276a1ad34f285a12d4a40febb92cafd37ac0ab8c476c240912a
-
Size
2.7MB
-
Sample
230612-29tlraea86
-
MD5
bd83b22d90836c81047b081dcbacb63d
-
SHA1
ce52554f5bbd0e26332309166a2912609797f8b6
-
SHA256
5bc457579941e276a1ad34f285a12d4a40febb92cafd37ac0ab8c476c240912a
-
SHA512
8025ca796c9273fe5e6fb3e1e1481d63bce796462ebae24857d8aae01bc74c9634bdb509c4f57f23c0523005f89f8eb78f827e34a65cce8502c994494aa5b1c0
-
SSDEEP
49152:TFS3NYgv3IsJks7JFsaaq7VZbAMS9IeD/P/sXZYkZ4jh+:TYbv3Isms1kq7DMFNTkqkZQh+
Static task
static1
Behavioral task
behavioral1
Sample
5bc457579941e276a1ad34f285a12d4a40febb92cafd37ac0ab8c476c240912a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5bc457579941e276a1ad34f285a12d4a40febb92cafd37ac0ab8c476c240912a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
loaderbot
https://sh4453464.c.had.su/cmd.php
Targets
-
-
Target
5bc457579941e276a1ad34f285a12d4a40febb92cafd37ac0ab8c476c240912a
-
Size
2.7MB
-
MD5
bd83b22d90836c81047b081dcbacb63d
-
SHA1
ce52554f5bbd0e26332309166a2912609797f8b6
-
SHA256
5bc457579941e276a1ad34f285a12d4a40febb92cafd37ac0ab8c476c240912a
-
SHA512
8025ca796c9273fe5e6fb3e1e1481d63bce796462ebae24857d8aae01bc74c9634bdb509c4f57f23c0523005f89f8eb78f827e34a65cce8502c994494aa5b1c0
-
SSDEEP
49152:TFS3NYgv3IsJks7JFsaaq7VZbAMS9IeD/P/sXZYkZ4jh+:TYbv3Isms1kq7DMFNTkqkZQh+
Score10/10-
LoaderBot executable
-
XMRig Miner payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-