General
-
Target
4976-12-0x0000000000400000-0x00000000004A2000-memory.dmp
-
Size
648KB
-
Sample
240701-xvganaybkj
-
MD5
dc740011d709fbcaa5aad8bb6f01d619
-
SHA1
3355af2680e3660e35f5906dbc3ff30f1ad90c1f
-
SHA256
b7080833c3e7895f70bef2bc9fd6a59a7b5451b471f28c7c6a781c5da4455eac
-
SHA512
1174160a7133607a9d9d53f80757c7f21a218755712b4b770eec5582be23ebd0528df18bed6e696bbb687c404b7f3df884627c4205e11db1cc839a1f420a41b1
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/Eq1Izmd:nSHIG6mQwGmfOQd8YhY0/EwUG
Behavioral task
behavioral1
Sample
4976-12-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4976-12-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
lokibot
http://dashboardproducts.info/bally/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
4976-12-0x0000000000400000-0x00000000004A2000-memory.dmp
-
Size
648KB
-
MD5
dc740011d709fbcaa5aad8bb6f01d619
-
SHA1
3355af2680e3660e35f5906dbc3ff30f1ad90c1f
-
SHA256
b7080833c3e7895f70bef2bc9fd6a59a7b5451b471f28c7c6a781c5da4455eac
-
SHA512
1174160a7133607a9d9d53f80757c7f21a218755712b4b770eec5582be23ebd0528df18bed6e696bbb687c404b7f3df884627c4205e11db1cc839a1f420a41b1
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/Eq1Izmd:nSHIG6mQwGmfOQd8YhY0/EwUG
Score3/10 -