General

  • Target

    1200-75-0x0000000001ED0000-0x0000000001F72000-memory.dmp

  • Size

    648KB

  • MD5

    1dfc3fd25320d6353fdd2f6f2197dac9

  • SHA1

    b5c1f8afdcd50c39789635560dce4f4b1c77bf08

  • SHA256

    3542f6c4a147510f84ccd27e13a91e24c1b484ed42bedf1e52cf69d0953dea7b

  • SHA512

    e22e94a9f462dd750f7ede13621b37e7e88f3d2ea2890ba741c4d970d3acb79c555c37382f9f178448a9ca014a4422d213669e1f4fa491836ff4dca2d27d002c

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://95.179.142.132/cleff/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1200-75-0x0000000001ED0000-0x0000000001F72000-memory.dmp
    .exe windows:5 windows x86 arch:x86

    0239fd611af3d0e9b0c46c5837c80e09


    Headers

    Imports

    Sections