General

  • Target

    1440-1090-0x0000000000400000-0x00000000004A2000-memory.dmp

  • Size

    648KB

  • MD5

    35fbb2d4aa2f48b55faf5dbd3932a87d

  • SHA1

    55bf5302e633303d53ac33e3ff59318472802eb9

  • SHA256

    f586370a550a4454400bc6fd4c2c30f389b0dea7c5876b4edc63cf6f1f651812

  • SHA512

    eaffefeb7906ddfd4c09f63cd89f24d83e45f4312bbeb4c8f34f210f5894d9d5fa5af26f5c3d15f9eeca2637deb7cadcc8a2af79fa279f8dcf50eeab2ba54b96

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqmIzmd:nSHIG6mQwGmfOQd8YhY0/EbUG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://194.55.224.11/mathew/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1440-1090-0x0000000000400000-0x00000000004A2000-memory.dmp
    .exe windows x86


    Headers

    Sections