General
-
Target
3012-30-0x0000000000400000-0x00000000004A2000-memory.dmp
-
Size
648KB
-
Sample
240602-sntj7agc83
-
MD5
7d508f0af619e00b53a92e57148de82f
-
SHA1
ffbf9ab8330cc0a27309b045907d72a4d90d6ddf
-
SHA256
57e1b574e5c2a0861d6e957cbaa4f6996714a18bd7674d6099f1a17f3d6af76e
-
SHA512
ccbb0c677ae1d9912cedbcf3e3e9dfdd73edeebf0ad1015f3867356ac141cfbb08201e0a39970da98c71b3e525dd559a861a0660008d530fafe2b2d1f194921f
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG
Behavioral task
behavioral1
Sample
3012-30-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3012-30-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://namex-na.com/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
3012-30-0x0000000000400000-0x00000000004A2000-memory.dmp
-
Size
648KB
-
MD5
7d508f0af619e00b53a92e57148de82f
-
SHA1
ffbf9ab8330cc0a27309b045907d72a4d90d6ddf
-
SHA256
57e1b574e5c2a0861d6e957cbaa4f6996714a18bd7674d6099f1a17f3d6af76e
-
SHA512
ccbb0c677ae1d9912cedbcf3e3e9dfdd73edeebf0ad1015f3867356ac141cfbb08201e0a39970da98c71b3e525dd559a861a0660008d530fafe2b2d1f194921f
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG
Score3/10 -