loader.bin

First submission 2024-10-15 22:04:03

File details

File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Mime type: application/x-dosexec
File size: 245.5 KB (251392 bytes)
Compile time: 2024-10-14 17:49:14
MD5: 079caee72a8dac67029b96992050be5b
SHA1: 4f49d9306529385332c5aed5086f0a49dae2195e
SHA256: e7548ff8c5dac69f9e13dbf0384708490c1482e6f84603f59d8194d78504ec51
Import Hash : 54b907ef88e1152a442e4781bba49bdc
Sections 5 .text .rdata .data .pdata .reloc
Directories 3 import export relocation

File features detected

Is DLL
Packers
Anti Debug
Anti VM
Signed
XOR

OSINT Enrichments

Virus Total: 47/77 VT report date: 2024-10-15 20:20:37
Malware Type 3 trojan downloader pua
Threat Type 3 lazy redcap otcpx

URLs, FQDN and IP indicators 1

URL Host (FQDN/IP) Date Added
hXXp://176.111.174.140/api/loader.bin VirusTotal Report 176.111.174.140 VirusTotal Report 2024-10-15 22:04:03

PE Sections 0 suspicious

Name VAddress VSize Size SHA1 MD5 Suspicious
.text 0x1000 0xe217 58368 00d6971485d7a24c47afe47c0982e44615b4d72b 97cda0e19813c80be03691f8c397d035
.rdata 0x10000 0x6887 27136 13168f2dd98ad04f4b10fbf944fabc96826a3cec 2668061cc558607ac88a74bb1a02c7eb
.data 0x17000 0x28eb0 157696 04912c40e6b035b640c88f245dbce1335e8e7c8c 86328cf5a9d244719f59d0be8582d991
.pdata 0x40000 0xdb0 3584 bb7a0bb2f1887923d6c7cf5d42860d8f329386ab 15f971e0ccde39ac6f445fb5f6a9fe55
.reloc 0x41000 0xda0 3584 820d142c2f6df30715a902314432c95265c6e8b3 f2858f37ca4bf9f965577daccb069e0e

Anti debug functions 11

GetLastError
IsDebuggerPresent
IsProcessorFeaturePresent
OutputDebugStringW
Process32First
Process32FirstW
Process32Next
Process32NextW
RaiseException
TerminateProcess
UnhandledExceptionFilter

Strings analysis - File found

Binary
http://176.111.174.140/api/bot64.bin
http://176.111.174.140/api/bot.bin
Loader.bin
Library
KERNEL32.dll
Amscoree.dll
KernelBase.dll
USER32.dll
dKERNEL32.dll
mscoree.dll
WININET.dll
ADVAPI32.dll
SHELL32.dll
SHLWAPI.dll
ntdll.dll

Strings analysis - Possible IPs found 1

176.111.174.140

Strings analysis - Possible URLs found 3

http://schemas.microsoft.com/SMI/2005/WindowsSettings
http://176.111.174.140/api/bot64.bin
http://176.111.174.140/api/bot.bin

Import functions

PE Exports 1 suspicious

Function Address
?ReflectiveLoader@@YA_KXZ 0x18000d298
Name Latest seen MD5
nuSjygs.pack 2024-10-15 10:21:02 456c9a2f8300d5d3eae53785fb6e4985