Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 22:18
Static task
static1
Behavioral task
behavioral1
Sample
9a0daf89522bdde2b47327217a321fcb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9a0daf89522bdde2b47327217a321fcb.exe
Resource
win10v2004-20231215-en
General
-
Target
9a0daf89522bdde2b47327217a321fcb.exe
-
Size
213KB
-
MD5
9a0daf89522bdde2b47327217a321fcb
-
SHA1
468bbf25db564f10c4309897923d32dbc96ed1e0
-
SHA256
4458ec4454127d91a7637c5361e09d819ea7c7f96ddb921e3f9411862bd8ae77
-
SHA512
a88f66ce24876fa62244679465cd5d8f5f1451a46c1c4bcb5140d6b60a24fa389546e6e98b5c35ef9519e41f63e0eaa217813343ad2eb939f7d8fa262ff8e0f2
-
SSDEEP
3072:7DOzdYLWq5pwthOTs9dXTUe7WEDKR3azG0CMnyyclvVrF36jHIdkcsmC4lWmRPSz:7azvuEh/fIe7WtRoQMyZvVZ5sQAMPc
Malware Config
Signatures
-
Detects LgoogLoader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1784-1-0x0000000000170000-0x0000000000182000-memory.dmp family_lgoogloader -
LgoogLoader
A downloader capable of dropping and executing other malware families.