Behavioral task
behavioral1
Sample
2652-1-0x0000000000CC0000-0x00000000010BE000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2652-1-0x0000000000CC0000-0x00000000010BE000-memory.exe
Resource
win10v2004-20231023-en
General
-
Target
2652-1-0x0000000000CC0000-0x00000000010BE000-memory.dmp
-
Size
4.0MB
-
MD5
4f04de83a0a1e6e5e042c84be1f1ac78
-
SHA1
18c793d0d8fc8eaccefb7011162755110efc2be7
-
SHA256
7f19e2924f4142d7bd6f8f21fca0dc35bdc02d3df2bd06dac2eb4210b6d2a885
-
SHA512
c4f0d2f2b8995878ada8b6d9a544ea44977bbce5aee9b00ac174e7ff887b4b5d114405935042bbd11644340ac3187a6d0c3963a8fd6fd3eb9e89c35da62333c9
-
SSDEEP
49152:cNDFFPJu8fBsVE6ij+RNg+UKpBvtqB3m1RC3:6zP88fBsnZTgOtqB3m1RC3
Malware Config
Extracted
loaderbot
http://185.236.76.77/cmd.php
Signatures
-
LoaderBot executable 1 IoCs
resource yara_rule sample loaderbot -
Loaderbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2652-1-0x0000000000CC0000-0x00000000010BE000-memory.dmp
Files
-
2652-1-0x0000000000CC0000-0x00000000010BE000-memory.dmp.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ