General

  • Target

    2868-31-0x0000000000400000-0x00000000004A2000-memory.dmp

  • Size

    648KB

  • MD5

    4f32787d73a872b4a25dc77d08654c76

  • SHA1

    74c156671f7b5292a7b8ffe2b4b6ea01178ad1e2

  • SHA256

    bafe621ec7e7938802e6d92bb18421d2525b366497353731e6cddc31691866eb

  • SHA512

    bfa9572d91411e794b050b33f301d597fe52f7df2c256c92fbc8222487f11d58302176d368bca429fc1bba711a797ac465d86ed2a70e1b4c792772a6887809fa

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://45.61.137.215/index.php/3b1tenbkyj

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2868-31-0x0000000000400000-0x00000000004A2000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections