General

  • Target

    2652-1-0x0000000000CC0000-0x00000000010BE000-memory.dmp

  • Size

    4.0MB

  • MD5

    4f04de83a0a1e6e5e042c84be1f1ac78

  • SHA1

    18c793d0d8fc8eaccefb7011162755110efc2be7

  • SHA256

    7f19e2924f4142d7bd6f8f21fca0dc35bdc02d3df2bd06dac2eb4210b6d2a885

  • SHA512

    c4f0d2f2b8995878ada8b6d9a544ea44977bbce5aee9b00ac174e7ff887b4b5d114405935042bbd11644340ac3187a6d0c3963a8fd6fd3eb9e89c35da62333c9

  • SSDEEP

    49152:cNDFFPJu8fBsVE6ij+RNg+UKpBvtqB3m1RC3:6zP88fBsnZTgOtqB3m1RC3

Score
10/10

Malware Config

Extracted

Family

loaderbot

C2

http://185.236.76.77/cmd.php

Signatures

  • LoaderBot executable 1 IoCs
  • Loaderbot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2652-1-0x0000000000CC0000-0x00000000010BE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections