General

  • Target

    1120-104-0x0000000000400000-0x00000000004A2000-memory.dmp

  • Size

    648KB

  • MD5

    539a2c598193c68fe219274f4688eaf3

  • SHA1

    90505a3ac664d41504529b77f5be221d1ad0292d

  • SHA256

    afd11f914f7d76f175121cd2ef9071b3905db37abefca58aa30061afd6be1195

  • SHA512

    df9f4a54da7c795abd6db2604e5168eed9c4a262b159f7c7c346463817ad3b04dc31b1658bff9781e7825639c21f10c2d41bec65a6aa52593770c76eab7abe64

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqkIzmd:nSHIG6mQwGmfOQd8YhY0/EhUG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://94.156.177.95/simple/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1120-104-0x0000000000400000-0x00000000004A2000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections