General

  • Target

    1704-0-0x00000000000C0000-0x00000000000CD000-memory.dmp

  • Size

    52KB

  • MD5

    aa1bacb7c26092ace03387ed552fb3cf

  • SHA1

    7054fe54a782770ec70a26fcc0d9950b80b08ee6

  • SHA256

    fadd3d3983adf3c6f9dd3fa1eee0d3bf395d64775d15f60bd9ec45fb4e71f481

  • SHA512

    eedbae527e43b1ac566443be3ec9940ca150c82cd566fb777b87ad8f2a7eddf27c0bd07699344507517db34e564ccc5264cf55839c33368fdc7d5278524c4575

  • SSDEEP

    1536:xN/KjXcaGbNfVUUZh9pElrX9FJElU+QO:AXcDxfVUWh9pEF9FuW+R

Score
10/10

Malware Config

Extracted

Family

koiloader

C2

http://45.86.162.187/overapplaud.php

Attributes
  • payload_url

    https://www.crowcrm.eu/adserver/docs/images

Signatures

  • Detects KoiLoader payload 1 IoCs
  • Koiloader family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1704-0-0x00000000000C0000-0x00000000000CD000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections