Behavioral task
behavioral1
Sample
4924-134-0x0000000000400000-0x000000000068E000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4924-134-0x0000000000400000-0x000000000068E000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
4924-134-0x0000000000400000-0x000000000068E000-memory.dmp
-
Size
2.6MB
-
MD5
4c5502b64b31a81fb485a97930fd968e
-
SHA1
1db6bfb777d0a41c2db8b2fa1c78d3e67f69521d
-
SHA256
34ecef4d608d488bc98746e351631259c84cae3725b51abbfbb8b0cf60a180d0
-
SHA512
1a8ab3265093560b53e93dec026628c7d9150ec171b43c22696754e912f56d9129c04f24a7814dcb793c735b189387ae80544c1e5247e0a348e01ec78188ff22
-
SSDEEP
49152:RYDCR/+vZiNawzi2CWgglVb4Fb8xxlyipaNuKh5M:aGRWvZiIw22CWgwEGV9ay
Malware Config
Extracted
lokibot
http://
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Lokibot family
Files
-
4924-134-0x0000000000400000-0x000000000068E000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 56KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
P��ƅ�� Size: 1289.3MB - Virtual size: 5.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
lamrgbqw Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fcvrahws Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE