General
-
Target
2592-19-0x0000000000400000-0x00000000004A2000-memory.dmp
-
Size
648KB
-
Sample
240806-kn74ksyelh
-
MD5
24c3ecc823e2fc57d3482c112eb244c7
-
SHA1
4e251d08f22e48726cc57c9df201c8c5e7e0a511
-
SHA256
f2964821e3e863acfeea7d4b4ff487719f0a1e7fd085a6aea179db24f21789b0
-
SHA512
0a8d1a8c839ae65e4e462272ed9922b8351daacf9b4202cd2e857d1f86be68e1ab881bdfc8e36662bfaa680cdaa352f078a8bedc3480c556e4737cfe2b1a7aa5
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/Eq2Izmd:nSHIG6mQwGmfOQd8YhY0/ETUG
Behavioral task
behavioral1
Sample
2592-19-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2592-19-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://45.61.137.215/index.php/modify?post=1
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
2592-19-0x0000000000400000-0x00000000004A2000-memory.dmp
-
Size
648KB
-
MD5
24c3ecc823e2fc57d3482c112eb244c7
-
SHA1
4e251d08f22e48726cc57c9df201c8c5e7e0a511
-
SHA256
f2964821e3e863acfeea7d4b4ff487719f0a1e7fd085a6aea179db24f21789b0
-
SHA512
0a8d1a8c839ae65e4e462272ed9922b8351daacf9b4202cd2e857d1f86be68e1ab881bdfc8e36662bfaa680cdaa352f078a8bedc3480c556e4737cfe2b1a7aa5
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/Eq2Izmd:nSHIG6mQwGmfOQd8YhY0/ETUG
Score3/10 -