General
-
Target
1752-31-0x0000000000400000-0x00000000004A2000-memory.dmp
-
Size
648KB
-
Sample
240806-v5q7havfmr
-
MD5
a226c8613a42354a785e450eccd63741
-
SHA1
b7f88c1f2e0b7d1459a920a0dd25b6eef954a665
-
SHA256
0b62b02b9d7d6c0c201a2a4a0d3b992362311c5ca1ab495c0bbe22b87b9fe099
-
SHA512
f076f8358af76d098373acdba4bd2a6e58af0115e2a7c01869fa43b4b918162c9c125b38acf9f9e245650ce75cbdad9b1a7ad95a93d6c7a06f68b0b6540ee0ca
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqjcIzmd:nSHIG6mQwGmfOQd8YhY0/E5UG
Behavioral task
behavioral1
Sample
1752-31-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1752-31-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
lokibot
http://mtuogioanis.com/mad/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
1752-31-0x0000000000400000-0x00000000004A2000-memory.dmp
-
Size
648KB
-
MD5
a226c8613a42354a785e450eccd63741
-
SHA1
b7f88c1f2e0b7d1459a920a0dd25b6eef954a665
-
SHA256
0b62b02b9d7d6c0c201a2a4a0d3b992362311c5ca1ab495c0bbe22b87b9fe099
-
SHA512
f076f8358af76d098373acdba4bd2a6e58af0115e2a7c01869fa43b4b918162c9c125b38acf9f9e245650ce75cbdad9b1a7ad95a93d6c7a06f68b0b6540ee0ca
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqjcIzmd:nSHIG6mQwGmfOQd8YhY0/E5UG
Score3/10 -