MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0724bc0b4abf5e1ae32a9fb01f6a9e18b6d5f086f8b19c3d41cd172fbf57e6bc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 8


Intelligence 8 IOCs YARA 3 File information Comments

SHA256 hash: 0724bc0b4abf5e1ae32a9fb01f6a9e18b6d5f086f8b19c3d41cd172fbf57e6bc
SHA3-384 hash: b8f11a6de1202ec5a6ff77f9c66c4741fdec0135f4a1f0806c8c7f198edc3d9fc305486d25406a16889f082d0c40ef4b
SHA1 hash: fae026ce4b1ad77cdf7f6978137c8cbcc4f3b731
MD5 hash: cc442d17ba42bd044b8494b9b568dd9b
humanhash: charlie-beryllium-yellow-apart
File name:9ap.exe
Download: download sample
Signature Loki
File size:256'661 bytes
First seen:2020-08-14 08:46:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7c2c71dfce9a27650634dc8b1ca03bf0 (160 x Loki, 58 x Formbook, 55 x Adware.Generic)
ssdeep 6144:2PCganN2J6Lj9ypbHYVBV/SaFbeA925pW7JFUV9:Ean8+GQP/SuyAoDWtFu9
Threatray 513 similar samples on MalwareBazaar
TLSH 49440211BF21E997D4A116711930E6F0B7AABE091A6456077BC83FFF35360C2888DE76
Reporter abuse_ch
Tags:exe Loki


Avatar
abuse_ch
Malspam distributing Loki:

HELO: webmelbourne.com
Sending IP: 178.128.18.239
From: PURCHASE <joanna@webmelbourne.com>
Reply-To: covestone@yahoo.com
Subject: Quotation Request
Attachment: URGENT QUOTATION REQUEST 01402008.xlsx

Loki payload URL.
http://meganmall.ga/~zadmin/cwd/9ap.exe

Loki C2s:
http://modevin.ga/~zadmin/lmark/ap0s/mode.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
70
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file
Launching a process
Sending a UDP request
Reading critical registry keys
Changing a file
Replacing files
DNS request
Creating a file in the %AppData% subdirectories
Deleting a recently created file
Enabling the 'hidden' option for recently created files
Creating a window
Creating a file in the %AppData% directory
Creating a process from a recently created file
Creating a process with a hidden window
Forced shutdown of a system process
Unauthorized injection to a system process
Stealing user critical data
Sending an HTTP POST request to an infection source
Sending an HTTP GET request to an infection source
Result
Threat name:
Lokibot
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Creates an undocumented autostart registry key
Creates files in alternative data streams (ADS)
Drops or copies cmd.exe with a different name (likely to bypass HIPS)
Hides threads from debuggers
Hijacks the control flow in another process
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to steal Mail credentials (via file registry)
Yara detected aPLib compressed binary
Yara detected Lokibot
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 267011 Sample: 9ap.exe Startdate: 15/08/2020 Architecture: WINDOWS Score: 100 61 modevin.ga 2->61 63 cdn.onenote.net 2->63 65 3 other IPs or domains 2->65 81 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->81 83 Malicious sample detected (through community Yara rule) 2->83 85 Yara detected Lokibot 2->85 87 4 other signatures 2->87 11 9ap.exe 19 2->11         started        signatures3 process4 process5 13 rundll32.exe 11->13         started        signatures6 91 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 13->91 93 Hijacks the control flow in another process 13->93 95 Maps a DLL or memory area into another process 13->95 16 cmd.exe 70 13->16         started        21 cmd.exe 13->21         started        23 cmd.exe 13->23         started        process7 dnsIp8 51 meganmall.ga 31.184.254.243, 49731, 49732, 49733 SELECTELRU Russian Federation 16->51 53 modevin.ga 16->53 55 192.168.2.1 unknown unknown 16->55 37 C:\Users\user\AppData\Roaming\Vv30VKS.exe, PE32 16->37 dropped 39 C:\Users\user\AppData\Roaming\...\B52B3F.exe, PE32 16->39 dropped 41 C:\Users\user\AppData\Local\...\none[1].exe, PE32 16->41 dropped 67 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 16->67 25 Vv30VKS.exe 12 16->25         started        69 Tries to steal Mail credentials (via file registry) 21->69 71 Drops or copies cmd.exe with a different name (likely to bypass HIPS) 21->71 file9 signatures10 process11 file12 45 C:\Users\user\AppData\Local\Temp\uninst.exe, PE32 25->45 dropped 47 C:\Users\user\AppData\Local\...\setreg.exe, PE32 25->47 dropped 49 C:\Users\user\AppData\...\Bridesmaid.dll, PE32 25->49 dropped 89 Machine Learning detection for dropped file 25->89 29 rundll32.exe 25->29         started        signatures13 process14 signatures15 97 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 29->97 99 Hijacks the control flow in another process 29->99 101 Maps a DLL or memory area into another process 29->101 32 cmd.exe 3 8 29->32         started        process16 dnsIp17 57 51.161.96.106, 3001, 49774, 49859 OVHFR Canada 32->57 59 myexternalip.com 216.239.32.21, 443, 49776, 49860 GOOGLEUS United States 32->59 43 C:\Users\user\AppData\Local:15-08-2020, HTML 32->43 dropped 73 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 32->73 75 Creates files in alternative data streams (ADS) 32->75 77 Creates an undocumented autostart registry key 32->77 79 Hides threads from debuggers 32->79 file18 signatures19
Threat name:
Win32.Backdoor.Bladabhindi
Status:
Malicious
First seen:
2020-08-14 08:48:08 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
NSIS installer
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Lokibot
Author:JPCERT/CC Incident Response Group
Description:detect Lokibot in memory
Reference:internal research
Rule name:win_lokipws_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

Executable exe 0724bc0b4abf5e1ae32a9fb01f6a9e18b6d5f086f8b19c3d41cd172fbf57e6bc

(this sample)

Comments