General

  • Target

    872-64-0x0000000000400000-0x00000000004A2000-memory.dmp

  • Size

    648KB

  • MD5

    58731627badd2760d0c052bd5c5e683c

  • SHA1

    1db5035ed481f49fb5ea4ce0dda663f9573825b5

  • SHA256

    f9de3f02c76453a64e1e658ed0e2b5d20d72c58b6aabf2b5295566845a30ba64

  • SHA512

    d1d102333d02c936bdbfeb47d647d459640367f55ca6dffee3202c6960dabf8bae07ec1751e51de8ac3fd4ba39c31c3fab830eea9f238e1b5e4584e2700c7681

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://193.42.32.209/a/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 872-64-0x0000000000400000-0x00000000004A2000-memory.dmp
    .exe windows x86


    Headers

    Sections