General

  • Target

    1016-124-0x0000000000400000-0x00000000004DC000-memory.dmp

  • Size

    880KB

  • MD5

    55cf4d591845fbc99bf3fa26d098e458

  • SHA1

    caea01caac941ae446e67597fd692b6b5f3b4d57

  • SHA256

    6b834afe7d7c94c4471cf62e8b7c7cfaf9a557d2d69b6b9662edb4bc0c3e1951

  • SHA512

    8f47e19d318fb8e856338f42adaff1f4662697dbed15c8a76d5d840736135b14dfe26ab30cd8ba3d0e7886f3dbe32b5c81239aaf470df4d6cc31590a5903cbc3

  • SSDEEP

    12288:BMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Y/wPXKi:BnsJ39LyjbJkQFMhmC+6GD9owXK

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://161.35.102.56/~nikol/?p=4479137330

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1016-124-0x0000000000400000-0x00000000004DC000-memory.dmp
    .exe windows x86


    Headers

    Sections