MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 050a053b4f14b010cfc82949bb761c209d1b4a8e98675e1e13fe072ef942b246. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 16
| SHA256 hash: | 050a053b4f14b010cfc82949bb761c209d1b4a8e98675e1e13fe072ef942b246 |
|---|---|
| SHA3-384 hash: | fef0b5386f1135873c0d1fce5c7df6cd5c64cf74c617692f8959505af586d93420162b2f0b23c1964bcc215d42a7d0ea |
| SHA1 hash: | 1c1213963a94cf1e5b859a4a73a0e21e23de273d |
| MD5 hash: | ee14c565bbf2e16814d6d0b041af26b5 |
| humanhash: | skylark-music-yellow-minnesota |
| File name: | ee14c565bbf2e16814d6d0b041af26b5 |
| Download: | download sample |
| Signature | Loki |
| File size: | 883'200 bytes |
| First seen: | 2022-09-21 08:27:48 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'206 x SnakeKeylogger) |
| ssdeep | 12288:WSG5L7STIdINmXWCCznPPKkOAtZaHQIlkclGsIZ:bG5fWUO5CCzKk3qHQIlkcl14 |
| Threatray | 9'076 similar samples on MalwareBazaar |
| TLSH | T169159D2523E94F17F0766BF845B0D0B197B5BC16A46AC24E1EC66CCFB465F60CA60723 |
| TrID | 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.4% (.EXE) Win64 Executable (generic) (10523/12/4) 6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.4% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.EXE) OS/2 Executable (generic) (2029/13) |
| File icon (PE): | |
| dhash icon | 74d298b898b0f8b4 (11 x AgentTesla, 11 x SnakeKeylogger, 9 x Formbook) |
| Reporter | |
| Tags: | 32 exe Loki |
Intelligence
File Origin
# of uploads :
1
# of downloads :
326
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
lokibot
ID:
1
File name:
Doc_CFW-231889.xlsx
Verdict:
Malicious activity
Analysis date:
2022-09-21 07:38:54 UTC
Tags:
encrypted exploit CVE-2017-11882 opendir loader trojan lokibot stealer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Enabling the 'hidden' option for analyzed file
Moving of the original file
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
60%
Tags:
anti-vm packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Loki
Verdict:
Malicious
Result
Threat name:
Lokibot
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AntiVM3
Yara detected aPLib compressed binary
Yara detected Lokibot
Behaviour
Behavior Graph:
Detection:
lokibot
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-09-21 06:05:47 UTC
File Type:
PE (.Net Exe)
Extracted files:
24
AV detection:
22 of 26 (84.62%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
lokipasswordstealer(pws)
Similar samples:
+ 9'066 additional samples on MalwareBazaar
Result
Malware family:
lokibot
Score:
10/10
Tags:
family:lokibot collection spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads user/profile data of web browsers
Lokibot
Malware Config
C2 Extraction:
http://208.67.105.161/jungleone/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
4c7a211833efd9735ef426812f9de9799cde637c766af113d5996025858cefa6
MD5 hash:
9409220e58f7a990257f133e499f559a
SHA1 hash:
f16bb7911166c27439511db69e9561775fe11ec4
SH256 hash:
a32f1e0c30603d0f73b192ddf25c9a2fe9d42d481e51dc02f1d9f7db0681f91e
MD5 hash:
dd141390ae9f9a974e3783ed0fc67315
SHA1 hash:
9e165c9de36379c5cfcc26531ad10f00c89646db
Detections:
lokibot
win_lokipws_auto
win_lokipws_g0
Parent samples :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 hash:
2470b39032f6182252039c88199016566b0de30c6aa02163a143427afedd12af
MD5 hash:
c3a1924684ca30ed22234ce1d9111dfc
SHA1 hash:
7347706241422758c06440fd6044ae4e042b456b
SH256 hash:
70dfa4c873605ab0fcdcb62be2a970da110535280d8dc88261edbe1ed2865307
MD5 hash:
d5b0f8aff064b3e828421b48efccd312
SHA1 hash:
724f4bc7ab4e08c45562748b739c8f7496a5ad8f
SH256 hash:
e331b30da0fec56a57161c44fd787b0889eba43416989e1d509651c8aba99b8a
MD5 hash:
626bff29cf188cdfd8d1fa94ed9fd5cd
SHA1 hash:
39a95d2a829bc711aaa4ea93db61e544abcbd343
SH256 hash:
050a053b4f14b010cfc82949bb761c209d1b4a8e98675e1e13fe072ef942b246
MD5 hash:
ee14c565bbf2e16814d6d0b041af26b5
SHA1 hash:
1c1213963a94cf1e5b859a4a73a0e21e23de273d
Malware family:
Lokibot
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Lokibot
Score:
0.90
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://23.95.122.112/nengi/nengi.exe