General

  • Target

    1992-74-0x0000000000400000-0x00000000004A5000-memory.dmp

  • Size

    660KB

  • MD5

    babfb44e138afae54c84cc8583dae636

  • SHA1

    f03dd43e6fbadd9eabc5213307a41ea227b60096

  • SHA256

    2be588715cb5a66c446bb3663104f4f929662043aa67c5bbc67826004885a00a

  • SHA512

    84070c5d6df81948f128e9cc3d8b843ab95d813c2dd1d767af88048a06039b9eb0279c170be1b5975671d8ed82944c2dc4b916b9abadefe4e68b6c19fb30ced4

  • SSDEEP

    1536:fgQLnwzvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqKIzmd6bt:NnzSHIG6mQwGmfOQd8YhY0/EHUG6

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://darls.us/am/ds/DEC.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 1992-74-0x0000000000400000-0x00000000004A5000-memory.dmp
    .exe windows x86


    Headers

    Sections