General

  • Target

    2176-1121-0x0000000000400000-0x00000000004A2000-memory.dmp

  • Size

    648KB

  • MD5

    c0c111a5c6d2689c4043c980bde70124

  • SHA1

    d0426900c8b6f3a9d613dcc47bf0cc1f957b9e81

  • SHA256

    7d975bb101d783580003cf11afde18ba66ad386069ce41c7ee78407a32a6b458

  • SHA512

    a06b425304f30a46be99efdc297f40c76789ebb677a7743a747c5e262e8ccf7ff687206f9c15152e23fb21afec64ec113fe1db9dfe5f4d55eb306a42212ae81f

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EquIzmd:nSHIG6mQwGmfOQd8YhY0/EPUG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://198.98.54.161/b25/pin.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2176-1121-0x0000000000400000-0x00000000004A2000-memory.dmp
    .exe windows x86


    Headers

    Sections