MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1358629ee5a2a95f315fde2b02b2a406a66410c8f3a041211fe85c797692c93c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 12
| SHA256 hash: | 1358629ee5a2a95f315fde2b02b2a406a66410c8f3a041211fe85c797692c93c |
|---|---|
| SHA3-384 hash: | d5a2fdafad8d8cbf616116e9f2e84074b641691f230007fbe94c84d6d19eb93d13f9e291ba20af6c49fc116a2d7a9c95 |
| SHA1 hash: | db771f2ef555c278169d0dac547394cc133eb648 |
| MD5 hash: | 5d651714669a45db84939208acf9b50d |
| humanhash: | apart-michigan-cold-seventeen |
| File name: | Customer Advisory - Notice of implementing Congestion surcharge (CGD) (1).pdf.exe |
| Download: | download sample |
| Signature | Loki |
| File size: | 809'984 bytes |
| First seen: | 2021-06-24 13:02:38 UTC |
| Last seen: | 2021-06-24 13:54:51 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'206 x SnakeKeylogger) |
| ssdeep | 12288:yYATgiebSMs8ftjF597eyOwoJA0LMnBDfYY:ymDs8ft5z79OwotLMnJl |
| Threatray | 3'303 similar samples on MalwareBazaar |
| TLSH | 60059E5E59F0AA7DFD0AC2B61096CD201EA1BD35A999E80EBBEF3C532F35414FD02542 |
| Reporter | |
| Tags: | exe Loki Lokibot |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
https://www.tepevizyon.com.tr/xx/Panel/fre.php
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Email_stealer_bin_mem |
|---|---|
| Author: | James_inthe_box |
| Description: | Email in files like avemaria |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_GENInfoStealer |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing common artifcats observed in infostealers |
| Rule name: | infostealer_loki |
|---|
| Rule name: | infostealer_xor_patterns |
|---|---|
| Author: | jeFF0Falltrades |
| Description: | The XOR and string patterns shown here appear to be unique to certain information-stealing malware families, namely LokiBot and Pony/Fareit. The XOR patterns were observed in a several loaders and payloads for LokiBot, but have also appeared (less frequently) in Pony/Fareit loaders and samples. The two accompanying rules below can be used to further classify the final payloads. |
| Rule name: | Loki |
|---|---|
| Author: | kevoreilly |
| Description: | Loki Payload |
| Rule name: | Lokibot |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Lokibot in memory |
| Reference: | internal research |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | STEALER_Lokibot |
|---|---|
| Author: | Marc Rivero | McAfee ATR Team |
| Description: | Rule to detect Lokibot stealer |
| Rule name: | win_lokipws_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | autogenerated rule brought to you by yara-signator |
| Rule name: | with_sqlite |
|---|---|
| Author: | Julian J. Gonzalez <info@seguridadparatodos.es> |
| Description: | Rule to detect the presence of SQLite data in raw image |
| Reference: | http://www.st2labs.com |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.