General

  • Target

    1920-21-0x0000000000400000-0x00000000004A2000-memory.dmp

  • Size

    648KB

  • MD5

    288b6c6250fe98f09c0ed10b43de93eb

  • SHA1

    8539b8fe44f6309b0073cc6c62c6a4a054486a37

  • SHA256

    1268adb1454784beec49ee0f81168f5794828d1d4ba45d460df7a8979a32b877

  • SHA512

    7bf4a12fb3235dd53d1b5218fc791821afbb9923f392556937809b9fcf12872ba665814e233054bc7a13d3749f1a48368e790a0c3a54a35001dd4dc4a60b974c

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://45.77.223.48/~blog/?ajax=a

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1920-21-0x0000000000400000-0x00000000004A2000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections