General

  • Target

    2852-30-0x0000000000400000-0x00000000004A2000-memory.dmp

  • Size

    648KB

  • MD5

    c8630be17ec72d186e1101f73af64468

  • SHA1

    5f50dd8c4e7394900d594516166bbeaa8890c941

  • SHA256

    d5c0355b6806d7004ee51238a13a421b6d0395e53afbfb8f9d710561716aadd1

  • SHA512

    109b9e75177fb1cf00249f7dec199568ef5dfe085e8026aebfe1cb05415f9a55365bafb8c2d4e2805a7cba15824416be21e0879fad04b55dbf29ec143b08bcd9

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/Eq8Izmd:nSHIG6mQwGmfOQd8YhY0/ExUG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://sempersim.su/d1/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2852-30-0x0000000000400000-0x00000000004A2000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections