General

  • Target

    876-64-0x0000000000400000-0x00000000004A2000-memory.dmp

  • Size

    648KB

  • MD5

    a14e4bcca2d1990afaf6fe3de66445a5

  • SHA1

    c1c7b39cf0bd97b3daa548f2b4b3288118855c5d

  • SHA256

    0fef9e72d318e7bdc89893fde66e79bd1959fecbaac224e9128d57533aeaecb3

  • SHA512

    81afb6ae3f0249d9a641634e89a88cbb3d9f65308bc4db165f587dae47488cb436fdb25dd5ab13ce65c09eaa9ccd7ab4c8bd6501d90a183b8056d34137ba5be5

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

https://hghfe.cf/Cj/PWS/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 876-64-0x0000000000400000-0x00000000004A2000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections