General
-
Target
2324-13-0x0000000000400000-0x00000000004A2000-memory.dmp
-
Size
648KB
-
Sample
250222-xpakxsxps2
-
MD5
8ae4c251f4ab3b854e1d3d8a7664d6dd
-
SHA1
4044e2562c851b03d81cc4ccb241304f2d244b57
-
SHA256
0b58c3ea20da87eb1bc60ca8b3a91f70b968afd9287904b855cec40b0637308d
-
SHA512
49ecc513df822b71f1f9fa2c9b781ff6401a3ef3a2182ccbbdd8ac1b7db3f6be5f33e9aeb672d5c498c5bc0468794f819ee2096abd673606de73afc2a11f08e3
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/Eq9Izmd:nSHIG6mQwGmfOQd8YhY0/E4UG
Behavioral task
behavioral1
Sample
2324-13-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
2324-13-0x0000000000400000-0x00000000004A2000-memory.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
lokibot
https://ddrtot.shop/New/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
2324-13-0x0000000000400000-0x00000000004A2000-memory.dmp
-
Size
648KB
-
MD5
8ae4c251f4ab3b854e1d3d8a7664d6dd
-
SHA1
4044e2562c851b03d81cc4ccb241304f2d244b57
-
SHA256
0b58c3ea20da87eb1bc60ca8b3a91f70b968afd9287904b855cec40b0637308d
-
SHA512
49ecc513df822b71f1f9fa2c9b781ff6401a3ef3a2182ccbbdd8ac1b7db3f6be5f33e9aeb672d5c498c5bc0468794f819ee2096abd673606de73afc2a11f08e3
-
SSDEEP
1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/Eq9Izmd:nSHIG6mQwGmfOQd8YhY0/E4UG
Score3/10 -