MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 0a0bd0cd5811edb28b920334d242531fe420a9485a38db7c89bd870ec1926602. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 15
| SHA256 hash: | 0a0bd0cd5811edb28b920334d242531fe420a9485a38db7c89bd870ec1926602 |
|---|---|
| SHA3-384 hash: | 542ab7630137c8ee11f682ea413a0d5a93f0bdf36088676c619171202bdbaab8b018d283f642887f38e52f189205c9a2 |
| SHA1 hash: | ddb92da11de6f123d382d4cda4ec082a5c78edff |
| MD5 hash: | ac5690fe56adc55a6c427312a785df4c |
| humanhash: | artist-west-timing-mike |
| File name: | ac5690fe56adc55a6c427312a785df4c.exe |
| Download: | download sample |
| Signature | Loki |
| File size: | 529'920 bytes |
| First seen: | 2023-04-04 05:46:20 UTC |
| Last seen: | 2023-04-04 06:36:21 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:KC5l5/AK1CAKu2wdAYo5Aj0ElQ9nZ0/RAPpyc5NAMuykMBeYLwr:KC5l57RJJ1oKjllQ1Zooyc5NAsUD |
| Threatray | 3'999 similar samples on MalwareBazaar |
| TLSH | T1CFB4120923289366DB6C07BD9032B10407F5F1237912F7595DC968EFB8B7BD49AA09CE |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Reporter | |
| Tags: | exe Loki |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Suspicious_Macro_Presence |
|---|---|
| Author: | Mehmet Ali Kerimoglu (CYB3RMX) |
| Description: | This rule detects common malicious/suspicious implementations. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.