General

  • Target

    1404-55-0x00000000002C0000-0x0000000001324000-memory.dmp

  • Size

    16.4MB

  • MD5

    a40922a0817209921c662b4bc780074b

  • SHA1

    284b40820d81280fa938c6c76dca15b712fb8813

  • SHA256

    5f9a1acbfa17eca5ded815ac04fed1a4a60f5a098363633ef005a77497e5640c

  • SHA512

    7796e69eed7adb0bb676e759cd36bd64734e3ff32cd27abe16f628afe38c1b91223ff529605d4ed65d63dc618cbe33590902edf7ecf23dbed7994f028c1251bb

  • SSDEEP

    393216:ZuEKRCaqXnU6lzje+CtrDXXTUPSPS4JTZ/wJ3cip8b96:ZuLqXWTZ8DKbE

Score
10/10

Malware Config

Extracted

Family

loaderbot

C2

http://92.204.173.86/cmd.php

Signatures

  • LoaderBot executable 1 IoCs
  • Loaderbot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1404-55-0x00000000002C0000-0x0000000001324000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections