General
-
Target
1044-68-0x0000000000400000-0x00000000004A2000-memory.dmp
-
Size
648KB
-
Sample
230202-xlmfbaha5t
-
MD5
ef6cd28f01abe6036f9789a008af6002
-
SHA1
e8b88e559bfd25c89f41931c9a50f24fe2fde39e
-
SHA256
27e5f1f8bbcdc94f3bd98949a54fea4249def0404cbfd92f1ddc5091a9b0d98f
-
SHA512
d01fe1c7fcaa83f86c461bc6c2940410aa28d6f05cc8239cf87f00935e1b8be924185c460cae80882a1bc194c6448cc9659f7c8b438ac29beed82ce69715fe67
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG
Behavioral task
behavioral1
Sample
1044-68-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1044-68-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
lokibot
https://sempersim.su/ha8/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
1044-68-0x0000000000400000-0x00000000004A2000-memory.dmp
-
Size
648KB
-
MD5
ef6cd28f01abe6036f9789a008af6002
-
SHA1
e8b88e559bfd25c89f41931c9a50f24fe2fde39e
-
SHA256
27e5f1f8bbcdc94f3bd98949a54fea4249def0404cbfd92f1ddc5091a9b0d98f
-
SHA512
d01fe1c7fcaa83f86c461bc6c2940410aa28d6f05cc8239cf87f00935e1b8be924185c460cae80882a1bc194c6448cc9659f7c8b438ac29beed82ce69715fe67
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG
Score3/10 -