General

  • Target

    1876-15-0x0000000000400000-0x00000000004A2000-memory.dmp

  • Size

    648KB

  • MD5

    4c70e1b70f62f04afc01cf51342eb405

  • SHA1

    ee39e437b1f710139cc9c0816273b64d5c6d3ab6

  • SHA256

    5cc17a4783718e6ae101e0ab2127c862c7ced45f51efffb7eda9bfec45a27d51

  • SHA512

    7d12563b4d2bef8bd2cd114d78140a7a662dd39859695357fea0f9ba819703d3ef624802da414d84d73fbab4f36b7df451613334ed19a3fdf2a6c0af0eb5bab1

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://evil22.aerostarmodel.buzz/_errorpages/evil22/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1876-15-0x0000000000400000-0x00000000004A2000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections