General

  • Target

    560-93-0x0000000000400000-0x00000000004A2000-memory.dmp

  • Size

    648KB

  • MD5

    a447203ca7e4259204c7537219b5cc6b

  • SHA1

    63e7c477890b173d3b35dab522d47cd43c34eb9d

  • SHA256

    fd1376233a7808d3d47b41ec14110449e5ff41ae7ea09b42d93b58a67ff12f08

  • SHA512

    04306aff763561c71077c6398c2a596804ce99dc850d731e97a8b234bfb4cdd69757353f1fe6f571bae569d19b9293f26686933c702484552a3a4a26e672b569

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/Eq4Izmd:nSHIG6mQwGmfOQd8YhY0/E1UG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.85/fresh/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 560-93-0x0000000000400000-0x00000000004A2000-memory.dmp
    .exe windows x86


    Headers

    Sections