General
-
Target
2684-29-0x0000000000400000-0x00000000004A2000-memory.dmp
-
Size
648KB
-
Sample
240806-tbq4zatamq
-
MD5
4be7bce49372f8a4523eec4027b7d159
-
SHA1
54fe64a8e1ab4dd5dc719017dc52ebe37bbf4500
-
SHA256
ea4b7824c0a1ebc38dd973264e7f57ccc2dbbf4deb98149a4910daf858f82585
-
SHA512
7af42f760bcdf846503c9f6e3b7d3871c7b6871f79584489a45d315230b7d355c0f8fa8596926b886ad74123eae475daeb525328451d58d2c67c4f8074be01b9
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqVIzmd:nSHIG6mQwGmfOQd8YhY0/EAUG
Behavioral task
behavioral1
Sample
2684-29-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2684-29-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://sempersim.su/d1/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
2684-29-0x0000000000400000-0x00000000004A2000-memory.dmp
-
Size
648KB
-
MD5
4be7bce49372f8a4523eec4027b7d159
-
SHA1
54fe64a8e1ab4dd5dc719017dc52ebe37bbf4500
-
SHA256
ea4b7824c0a1ebc38dd973264e7f57ccc2dbbf4deb98149a4910daf858f82585
-
SHA512
7af42f760bcdf846503c9f6e3b7d3871c7b6871f79584489a45d315230b7d355c0f8fa8596926b886ad74123eae475daeb525328451d58d2c67c4f8074be01b9
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqVIzmd:nSHIG6mQwGmfOQd8YhY0/EAUG
Score3/10 -