General

  • Target

    328-875-0x00000000001C0000-0x0000000000928000-memory.dmp

  • Size

    7.4MB

  • MD5

    e85a8a8417f95f0bd3c2f82c6c81ced5

  • SHA1

    8f93ed5fc5df59356ff749fa8d6af76bf95ef5dc

  • SHA256

    f9a988fa961effa94a6369aec4427e07fd0134d28c5161b0499000b0935a87df

  • SHA512

    693856ab5886bb7b4a7fa9ba9ea75b120bc033491197392bd1a2da8a87ab8ac808fa027f140e31203a4c35627ce442849e1fbca4be59de3acbc50ad9f3eb5cfa

  • SSDEEP

    98304:fzP88fBsnZTgOtqB3m1RC3aNcAveccI7cvOeCMeEvirO:rrpkE3aRC3scCQ2eC2

Score
10/10

Malware Config

Extracted

Family

loaderbot

C2

https://ca94025.tw1.ru/cmd.php

Signatures

  • LoaderBot executable 1 IoCs
  • Loaderbot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 328-875-0x00000000001C0000-0x0000000000928000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections