General

  • Target

    3056-12-0x0000000000400000-0x00000000004A2000-memory.dmp

  • Size

    648KB

  • MD5

    1983f857e251317207c1ecadfb54df9c

  • SHA1

    55eb525b792f00b6327824cd6392893f6f0c4ec6

  • SHA256

    456b64ba7dda20054c4d164e6144d8bdfb061d8f05b3b969391d61a76911b888

  • SHA512

    bd4cf3764e0bdb52b5458c8e51e5d1dcfc9e0129193c8e136a363037656a1172657e6c9659ca9fa82d142245c1edc264dfb6c881fdad57b7e664988dad3085e9

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/Eq5Izmd:nSHIG6mQwGmfOQd8YhY0/E4UG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://94.156.66.169:5788/bhvstgd/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3056-12-0x0000000000400000-0x00000000004A2000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections