General

  • Target

    3652-1091-0x0000000000400000-0x00000000004A2000-memory.dmp

  • Size

    648KB

  • MD5

    5c1650cae29e3cad84da657a78749363

  • SHA1

    0a1cbd4abcf7b1e53966b1660d900a6ef75860a6

  • SHA256

    db7d79364b112a7beb44bb146720eff21d1d4c2c7d90a8e2dea48f192193fe3c

  • SHA512

    b86a267e97221f8ebf609a9d4eb0c638f1030370a66d77675f083863700f5034c940a05bce3f763b93f00eebbe29821e9d16071a8b468e55c26fe168dfe3db93

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqOIzmd:nSHIG6mQwGmfOQd8YhY0/E7UG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://194.55.224.10/collins/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3652-1091-0x0000000000400000-0x00000000004A2000-memory.dmp
    .exe windows x86


    Headers

    Sections