Behavioral task
behavioral1
Sample
1992-74-0x0000000000400000-0x00000000004A5000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1992-74-0x0000000000400000-0x00000000004A5000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1992-74-0x0000000000400000-0x00000000004A5000-memory.dmp
-
Size
660KB
-
MD5
babfb44e138afae54c84cc8583dae636
-
SHA1
f03dd43e6fbadd9eabc5213307a41ea227b60096
-
SHA256
2be588715cb5a66c446bb3663104f4f929662043aa67c5bbc67826004885a00a
-
SHA512
84070c5d6df81948f128e9cc3d8b843ab95d813c2dd1d767af88048a06039b9eb0279c170be1b5975671d8ed82944c2dc4b916b9abadefe4e68b6c19fb30ced4
-
SSDEEP
1536:fgQLnwzvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqKIzmd6bt:NnzSHIG6mQwGmfOQd8YhY0/EHUG6
Malware Config
Extracted
lokibot
http://darls.us/am/ds/DEC.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
Files
-
1992-74-0x0000000000400000-0x00000000004A5000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 604KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 45KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE