General

  • Target

    316-85-0x0000000000400000-0x00000000004A2000-memory.dmp

  • Size

    648KB

  • MD5

    6a9ec5b41d24a0b0509c6f7d88324d52

  • SHA1

    97eae18922881d984231c269fc67b9a1cd0b1d9a

  • SHA256

    14b370cd320ae619b5492244c0a4db38b0456efef11cf0efc1ccabe858335b0b

  • SHA512

    e314eda8dd4fef68529d828c9ee03851b57ea6b057a8801071973780b47e8f0d3250bbe6479ff7b689164b1ec1b10148fe5ca121b71ebbac92778df103f0f8cb

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.60/governor/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 316-85-0x0000000000400000-0x00000000004A2000-memory.dmp
    .exe windows x86


    Headers

    Sections