Behavioral task
behavioral1
Sample
1704-0-0x00000000000C0000-0x00000000000CD000-memory.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1704-0-0x00000000000C0000-0x00000000000CD000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
1704-0-0x00000000000C0000-0x00000000000CD000-memory.dmp
-
Size
52KB
-
MD5
aa1bacb7c26092ace03387ed552fb3cf
-
SHA1
7054fe54a782770ec70a26fcc0d9950b80b08ee6
-
SHA256
fadd3d3983adf3c6f9dd3fa1eee0d3bf395d64775d15f60bd9ec45fb4e71f481
-
SHA512
eedbae527e43b1ac566443be3ec9940ca150c82cd566fb777b87ad8f2a7eddf27c0bd07699344507517db34e564ccc5264cf55839c33368fdc7d5278524c4575
-
SSDEEP
1536:xN/KjXcaGbNfVUUZh9pElrX9FJElU+QO:AXcDxfVUWh9pEF9FuW+R
Malware Config
Extracted
koiloader
http://45.86.162.187/overapplaud.php
-
payload_url
https://www.crowcrm.eu/adserver/docs/images
Signatures
Files
-
1704-0-0x00000000000C0000-0x00000000000CD000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ