c:\inetpub\wwwroot\Bot\Miner\obj\Release\LoaderBot.pdb
Behavioral task
behavioral1
Sample
364a15d8bb0ffb21e6b7dd650eb12b0b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
364a15d8bb0ffb21e6b7dd650eb12b0b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
364a15d8bb0ffb21e6b7dd650eb12b0b_JaffaCakes118
-
Size
16KB
-
MD5
364a15d8bb0ffb21e6b7dd650eb12b0b
-
SHA1
d0db53c0e2e9f4e2ac87ea879d50775b20114754
-
SHA256
fa5bbde6bc224e578b7eb2e4ea1506570b378279b4c5f79185043d15cc81b419
-
SHA512
51f24d29c20af9a8d75e5dd17e2e8cd7a09e196cda55442b6c502b1ac7f6ba7e89e5ceb448ecf10ca2b954be22f80c3e784ef8e122b97aa5cc276087f8696638
-
SSDEEP
384:e+FvJsPhdH19GTXjdhk1uujYcV6AUwJFZb:eAkfV9AhAfYcV6Dw9b
Malware Config
Extracted
loaderbot
http://s0rick.rckl.pw/cmd.php
Signatures
-
LoaderBot executable 1 IoCs
Processes:
resource yara_rule sample loaderbot -
Loaderbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 364a15d8bb0ffb21e6b7dd650eb12b0b_JaffaCakes118
Files
-
364a15d8bb0ffb21e6b7dd650eb12b0b_JaffaCakes118.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ