Behavioral task
behavioral1
Sample
1712-0-0x0000000000080000-0x000000000008D000-memory.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1712-0-0x0000000000080000-0x000000000008D000-memory.exe
Resource
win10v2004-20240508-en
General
-
Target
1712-0-0x0000000000080000-0x000000000008D000-memory.dmp
-
Size
52KB
-
MD5
3613b0e67edf6a6bf48a9311ada3c940
-
SHA1
a0973aec11b650bfa6cf03dea513a8b105092cbc
-
SHA256
7fffca501d8cb44b9a508e49169ec61afac161fd3a6d143ca0f2ca23021df49e
-
SHA512
25dd93193dd0964134ef6c2a0b1c4cd498faf2437afa1684e665552a0cf9bd487e36b3f7bafa9b529de5e79bced90016683eed80df1ee4d85bbf7ed9a51a3ca7
-
SSDEEP
768:xTOI/KasXcap4GsbNftF/Nll1h9uWVxolQ+p1t9FzZR1ob7FnwYbvKBQO:xN/KrXcaebNftX1h9JolD9FtAS/QO
Malware Config
Extracted
koiloader
http://45.86.162.187/overapplaud.php
-
payload_url
https://www.crowcrm.eu/adserver/docs/images
Signatures
Files
-
1712-0-0x0000000000080000-0x000000000008D000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ