General

  • Target

    1644-44-0x0000000000400000-0x00000000004A2000-memory.dmp

  • Size

    648KB

  • MD5

    7228333186e5e0d6a8b93d93036837d1

  • SHA1

    e7d8218f4dc92252983639c1d7b472aaedac1ab2

  • SHA256

    fba6eedcc5c7de7d144dcf6db2edd1bdc670297469d892aa466b265d7ee8bdc4

  • SHA512

    c0c12f8fe1a608f916561dbd5ae60a7f21bd369a422ef235f1d6af287a50e5149c883d963d2ad5ca5a0f493995c53abb2883d78b2c7e7a7aaf3fea7d90a3783a

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://91.92.252.146:4002/kioy/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1644-44-0x0000000000400000-0x00000000004A2000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections