Behavioral task
behavioral1
Sample
944-67-0x0000000000400000-0x00000000004A5000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
944-67-0x0000000000400000-0x00000000004A5000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
944-67-0x0000000000400000-0x00000000004A5000-memory.dmp
-
Size
660KB
-
MD5
afaa6ee855a29554f9bbd4c24e2bcf67
-
SHA1
c3363e38b275c74d295d4f2606ffaa18da2bcf65
-
SHA256
9499449c0f061421f6f17d68adff203ad5929cb902de9b14177320c5e169bf64
-
SHA512
ec17c1139dc43c9f142e9ba32647bbab668eb23604a20cb2e0726bdd4ffbff28a626d7e63e913be53c8d7a844367fc2d437b32580e8378edf28ef9ab377eb56b
-
SSDEEP
1536:HgQLnwzvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqnIzmdpbC:1nzSHIG6mQwGmfOQd8YhY0/EGUGp
Malware Config
Extracted
lokibot
http://208.67.105.161/starmoney/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
Files
-
944-67-0x0000000000400000-0x00000000004A5000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 604KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 45KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE