MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 12483b3ff6233b58cc621ca4078ecd9bb54e8b2a64627f0b4cfc7c94b288f83c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: 12483b3ff6233b58cc621ca4078ecd9bb54e8b2a64627f0b4cfc7c94b288f83c
SHA3-384 hash: d690ee27650ed7ba341fffefe35840813863d5572220f7aaeb2c46fd56e388dd49c37943d0d322442fc45cb6a5759581
SHA1 hash: 039cf74f8cac678d0eac3f256d7e2cdcdbe6c7c5
MD5 hash: 38f2f3fd4213e2350854440b1516e8ba
humanhash: uranus-sixteen-cola-oranges
File name:SHIPPING_DOC_BLBNTHCM22120020_20221218_PDF.exe
Download: download sample
Signature Loki
File size:779'776 bytes
First seen:2022-12-21 00:52:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:bdQ2iNju53bD1RyMPKVwMz+cyH9wdbBzcqk2skpx2cHss/S+P:bS1Vu5LDvy0nMnyKdb5cYPx2cHs6Sq
Threatray 14'199 similar samples on MalwareBazaar
TLSH T19EF48D8932F29037F6DB02301735BACC0D726A43797AF10A99677BA59131DFF7A94212
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter Anonymous
Tags:exe Loki

Intelligence


File Origin
# of uploads :
1
# of downloads :
189
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
lokibot
ID:
1
File name:
SHIPPING_DOC_BLBNTHCM22120020_20221218_PDF.exe
Verdict:
Malicious activity
Analysis date:
2022-12-21 00:54:48 UTC
Tags:
trojan lokibot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Unauthorized injection to a recently created process
Creating a file
Enabling the 'hidden' option for analyzed file
Moving of the original file
Verdict:
No Threat
Threat level:
  2/10
Confidence:
60%
Tags:
packed
Result
Threat name:
Lokibot
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AntiVM3
Yara detected aPLib compressed binary
Yara detected Lokibot
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2022-12-19 14:53:06 UTC
File Type:
PE (.Net Exe)
Extracted files:
10
AV detection:
28 of 39 (71.79%)
Threat level:
  5/5
Result
Malware family:
lokibot
Score:
  10/10
Tags:
family:lokibot collection spyware stealer trojan
Behaviour
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads user/profile data of web browsers
Lokibot
Malware Config
C2 Extraction:
http://171.22.30.147/gk1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files
SH256 hash:
22a99e2740dcb5fcab542cb6ee33472a01b8f226f76e031e31b9f00ca1b08b8c
MD5 hash:
bb7995fc982c684be3ddc978e7853bca
SHA1 hash:
b5b9064f2f4ca6b8fa9646700d0bb7d0e0acbd55
SH256 hash:
d0c8c62b2b65e7e2a46637d8d3f71c22b60219d57f0ca7b930b4a4fed4d490f4
MD5 hash:
9eee129f3473bdb0b5d9cb3df5df7ba1
SHA1 hash:
a8f474947f88252f61a2f6b6d921a3d86f2ddb6f
SH256 hash:
072bafe83d2a9c1e68c1675f13b8e5eb061b8033353a7555a6aa41fcf5dea886
MD5 hash:
6eae82e70a2e35e07f10c31e9328ebc5
SHA1 hash:
91c3942853029ebcbc56101d7550c8b7c6b35ac1
Detections:
lokibot win_lokipws_auto win_lokipws_g0
Parent samples :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 hash:
ff1b42ea7d56a37eae801adbddb7116f52a4664c0b41302736f522852edc2747
MD5 hash:
89ac57478044c57c7195943116a521e0
SHA1 hash:
1ff2bafeed795423e3538d810bda8e1e3fcdcfa5
SH256 hash:
c92ad6432113251205bd119eea5100a20f127269ebc12456c504347599634f57
MD5 hash:
b060b42d9c410887fbc632643039cde7
SHA1 hash:
1096f5e8782787ad32351e1b88066255658416f3
SH256 hash:
12483b3ff6233b58cc621ca4078ecd9bb54e8b2a64627f0b4cfc7c94b288f83c
MD5 hash:
38f2f3fd4213e2350854440b1516e8ba
SHA1 hash:
039cf74f8cac678d0eac3f256d7e2cdcdbe6c7c5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

Executable exe 12483b3ff6233b58cc621ca4078ecd9bb54e8b2a64627f0b4cfc7c94b288f83c

(this sample)

  
Dropped by
loki
  
Delivery method
Distributed via e-mail attachment

Comments