General

  • Target

    2728-15-0x0000000000400000-0x00000000004A2000-memory.dmp

  • Size

    648KB

  • MD5

    9a81f42aa17e90b4192b0d58670b952d

  • SHA1

    b384685f49e26f52c747d0ef81582d7d0e9a7ca3

  • SHA256

    e181e8301a61adc13a0f868dad959a12ef18cd94a4077f39f9cc93400fcf0edd

  • SHA512

    6abd9653fc8acd075805472fdcb4973f7234549748711564b57a1c8aefae21c9d511fe98443b0f27d5ec5fcad5437131a254306a5b4ebcfb7234aabed866c7e0

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqoIzmd:nSHIG6mQwGmfOQd8YhY0/EFUG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://45.61.137.215/index.php/41286969787314313

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2728-15-0x0000000000400000-0x00000000004A2000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections