Behavioral task
behavioral1
Sample
2260-67-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
2260-67-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2260-67-0x0000000000400000-0x00000000004A2000-memory.dmp
-
Size
648KB
-
MD5
a63d0aee3648399a02ce2c4ee33027d7
-
SHA1
9d7111598ed383eb576d93b7cbf4e2d2d2b553b7
-
SHA256
6dba09cb6be2f7a18e4f0ddf121be0642f8f432e7ffe9d489fa5b1306e868440
-
SHA512
d057af8d743896a5c09a4a01c9063ebc14ecde36542feeb133efdf62c9262be0f1a68e0e6f86c760dff18bc357896d31b45915de138c12effad45bbf81ace518
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/Eq8Izmd:nSHIG6mQwGmfOQd8YhY0/ExUG
Malware Config
Extracted
lokibot
http://138.68.56.139/?p=370764885722297
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Lokibot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2260-67-0x0000000000400000-0x00000000004A2000-memory.dmp
Files
-
2260-67-0x0000000000400000-0x00000000004A2000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 535KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.x Size: 8KB - Virtual size: 8KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE