Behavioral task
behavioral1
Sample
3792-1089-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3792-1089-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
3792-1089-0x0000000000400000-0x00000000004A2000-memory.dmp
-
Size
648KB
-
MD5
2fa88e1cf628e70be436d155ed57ab93
-
SHA1
21d792b656b43d3e8b80c159a6c891e24edbe799
-
SHA256
0bad3280178a142840e1a892a8eb947556e6b0d170464025cd1e92768b644cab
-
SHA512
b2b7ba229d67b26c445e5116824b38957230ace6eb98342f1d7778b53c5e30d80231d2704b1a216bbececb880f60bb8d4ce50ae9d48d94390535f1454beba2e8
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqNIzmd:nSHIG6mQwGmfOQd8YhY0/EkUG
Malware Config
Extracted
lokibot
http://2.59.254.19/noko/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Lokibot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3792-1089-0x0000000000400000-0x00000000004A2000-memory.dmp
Files
-
3792-1089-0x0000000000400000-0x00000000004A2000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 535KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.x Size: 8KB - Virtual size: 8KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE