MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 13bda2fab9d78868f30a0bb704eaa1db2e0dacfe11bd3dcd348290bfc67fe40c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 13bda2fab9d78868f30a0bb704eaa1db2e0dacfe11bd3dcd348290bfc67fe40c
SHA3-384 hash: fe0ece4e957361526f4273aabac50cecd74b23a021a7afc5ffe5089ec58a32a47633c8c3c3354d021c2da014043787e0
SHA1 hash: f4e3b490779151aa5477a5a1d0a9f296c8f6c68b
MD5 hash: 8ac9e272b1df5061daa9455ff0230c36
humanhash: leopard-speaker-crazy-six
File name:1.ps1
Download: download sample
Signature Loki
File size:300'877 bytes
First seen:2021-06-01 12:23:36 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 6144:9laTYe1Utx7ccUWqPcQtU78uNUysckPuILJGAm8Eu0tga+MLB:9laTYeqtx7cc3Okgu
Threatray 3'105 similar samples on MalwareBazaar
TLSH B154A645165BC2D5F19A4588386CF722087A747B7BC88A361237430AEBDED4A1DCFB8D
Reporter JAMESWT_WT
Tags:ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
258
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Threat name:
Script-PowerShell.Trojan.Heuristic
Status:
Malicious
First seen:
2021-06-01 12:23:56 UTC
File Type:
Text (PowerShell)
AV detection:
4 of 29 (13.79%)
Threat level:
  2/5
Result
Malware family:
lokibot
Score:
  10/10
Tags:
family:lokibot spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Lokibot
Malware Config
C2 Extraction:
http://173.208.204.37/k.php/SczbkxCQZQyVr
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments