General

  • Target

    352-51-0x00000000001B0000-0x0000000000252000-memory.dmp

  • Size

    648KB

  • MD5

    82b67cea3ba1bbb094b0d0072ff0525d

  • SHA1

    c7b44de8398dc54c13f9b74819e45a0a8cb160ba

  • SHA256

    33ce332d54db21e73d11bb810d4fe8a1eb979b0f1448a95be611472d42c84c23

  • SHA512

    e5180a894e8b16bac1ea7c7af2e9bf4b5541b823c68847bdf7dd6c3b22fe70f8f9929ef0d32d2127e08f5ff7f99013f7a5e5d5d4f70febfac4edddccda9032a8

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://rocheholding.top/evie3/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 352-51-0x00000000001B0000-0x0000000000252000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections