General

  • Target

    1924-91-0x0000000000400000-0x00000000004A7000-memory.dmp

  • Size

    668KB

  • MD5

    a7957efa611ff7eb0af8b55e06f006bf

  • SHA1

    ffbcbfa5aa8e4357bb80d3076ed306d62daa5643

  • SHA256

    6a6dc3832e725ab6eb1e02e4b4c770dc8e0628061336861e48da309fd82e7a6b

  • SHA512

    97de3190d4797913fa8689673d658b71fd423f9c0c06cb7c35c7a8381dca3477dc09e0ed252150680b51e739cf1f9a86d686b7aac65080872cd18e45921e6d8b

  • SSDEEP

    3072:nSHIG6mQwGmfOQd8YhY0/EqUGdAtK3KZ:ncd6bUfFdXThUUk

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://146.19.233.219/trip/rx/pin.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1924-91-0x0000000000400000-0x00000000004A7000-memory.dmp
    .exe windows x86


    Headers

    Sections