General

  • Target

    1668-66-0x0000000000400000-0x00000000007FE000-memory.dmp

  • Size

    4.0MB

  • MD5

    ffde0117a88a625fbd1755c307af2d65

  • SHA1

    fdb364f62048b94e8e4fc69343fcc47131fda83b

  • SHA256

    98d6958366bec9973d0befde70b2e9ac6b3c95d04dd63c111e80660f0c65a66c

  • SHA512

    416699b0e4775694ec014127edce422f5cd91374dbca74d6024db4e8e2fdf6c7f83c8a7b939a41deef9117d9441ae387205e0cdbe42f22b644aba8c9579d78aa

  • SSDEEP

    49152:bNDFFPJu8fBsVE6ij+RNg+UKpBvtqB3m1RC3:5zP88fBsnZTgOtqB3m1RC3

Score
10/10

Malware Config

Extracted

Family

loaderbot

C2

https://sh4453464.c.had.su/cmd.php

Signatures

  • LoaderBot executable 1 IoCs
  • Loaderbot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1668-66-0x0000000000400000-0x00000000007FE000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections