Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 17:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fd6058dc7a118e3115ecf987066649eb.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
fd6058dc7a118e3115ecf987066649eb.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
fd6058dc7a118e3115ecf987066649eb.exe
-
Size
257KB
-
MD5
fd6058dc7a118e3115ecf987066649eb
-
SHA1
1abb145064983a6a8630801fd09c244cad43a67e
-
SHA256
3c988a27e3850fc545681b3d75972659f9d762c0f764dfe1a5d75af996e4a900
-
SHA512
a1a80a691094695fdf82ed0634d8d8bee5e286965d7d76741214742573df43841cbeca8661eb800f8a26566e1ffe491461033227a001e52aad1e21d98b9784f9
-
SSDEEP
6144:bajSf7oQiNDh3K8UBO4N6dH6oc+m7OymiPs5qg6DZ:bajSBYRGqda0EJE5k
Score
10/10
Malware Config
Signatures
-
Detects LgoogLoader payload 1 IoCs
resource yara_rule behavioral2/memory/216-1-0x0000000001640000-0x0000000001652000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.