MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0864dbe292a5fc5e96f14f9e4164d3964660c45442f08a4151877ce4974d8ecb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence 1 File information 5 Yara 1 Comments

SHA256 hash: 0864dbe292a5fc5e96f14f9e4164d3964660c45442f08a4151877ce4974d8ecb
SHA3-384 hash: 94ffd661267a00151679fc6ee491500ea931989edec46acc6b7b415e4db2265bd754248bf7dfff0ddc578d48d9e25396
SHA1 hash: 697ae5ef7f232d81b66c369060882c30dc942fa8
MD5 hash: 7809e01e1d5e235a89203de4c892623c
humanhash: saturn-summer-south-speaker
File name:1307741.msi
Download: download sample
Signature Loki
File size:266'240 bytes
First seen:2020-06-30 12:31:05 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 6144:rEndqtv2x5F/Rsg+1t2ed43jR9iXYaWd+utdM6:rEndhHugZed4zR9iXYau
TLSH 8044DF39739C6D2FC97811F94062660847B99DA63493FBC65CC271EC19F6FE80A42E1B
Reporter @abuse_ch
Tags:Loki msi


Twitter
@abuse_ch
Malspam distributing Loki:

HELO: slot0.natvlgetor.com
Sending IP: 45.95.169.198
From: Patricia Alkaraz <ptcihk@natvlgetor.com>
Subject: Reg. Enquiry
Attachment: 1307741.xls

Loki payload URL:
http://199.195.250.60/gg/1307741.msi

Loki C2:
http://crogtrt.com/rozay/pin.php

Intelligence


Mail intelligence No data
# of uploads 1
# of downloads 27
Origin country CH CH
CAPE Sandbox Detection:n/a
Link: https://www.capesandbox.com/analysis/17142/
ClamAV SecuriteInfo.com.MSIL.Kryptik.VFR-1.UNOFFICIAL
CERT.PL MWDB Detection:lokibot
Link: https://mwdb.cert.pl/sample/0864dbe292a5fc5e96f14f9e4164d3964660c45442f08a4151877ce4974d8ecb/
ReversingLabs :Status:Malicious
Threat name:ByteCode-MSIL.Trojan.Kryptik
First seen:2020-06-30 12:33:04 UTC
AV detection:17 of 31 (54.84%)
Threat level:   2/5
Spamhaus Hash Blocklist :Malicious file
Hatching Triage Score:   10/10
Malware Family:lokibot
Link: https://tria.ge/reports/200630-epss96kpjx/
Tags:discovery spyware trojan stealer family:lokibot persistence
Config extraction:http://crogtrt.com/rozay/pin.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
VirusTotal:No data

Yara Signatures


Rule name:SharedStrings
Author:Katie Kleemola
Description:Internal names found in LURK0/CCTV0 samples

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

Microsoft Software Installer (MSI) msi 0864dbe292a5fc5e96f14f9e4164d3964660c45442f08a4151877ce4974d8ecb

(this sample)

Comments