MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 13cd902db4c2d83cf33f2d2ab048f048126f7152a8e549fa31f5deeb4f2f0294. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 8
| SHA256 hash: | 13cd902db4c2d83cf33f2d2ab048f048126f7152a8e549fa31f5deeb4f2f0294 |
|---|---|
| SHA3-384 hash: | 102785186076610144a8082b170cd124a1239f3d2e79a05a2d7b75b5e3e5ba0e7d584de64f40f19d4282956eef81a4e1 |
| SHA1 hash: | 327fac8f44f2499bb94242791bd902d4f952adc8 |
| MD5 hash: | ecc32f34e2f7dd3142a79941b96d67f0 |
| humanhash: | washington-minnesota-nuts-april |
| File name: | Doc0294585692_exe.exe |
| Download: | download sample |
| Signature | Loki |
| File size: | 377'344 bytes |
| First seen: | 2021-08-31 10:25:16 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | ef471c0edf1877cd5a881a6a8bf647b9 (74 x Formbook, 33 x Loki, 29 x Loda) |
| ssdeep | 6144:I4XrK9PX7Fp6Gh2wWRGl0EDDf1PisZQ5rAGQwg1QtP1f4paaYlsdcaMJEdbI0Pz9:XXe9PPlowWX0t6mOQwg1Qd15CcYk0Wet |
| Threatray | 5'603 similar samples on MalwareBazaar |
| TLSH | T1E984124548C4CCA6E71AB370D0B7CF9819757832CCD66B689754EA2EB870343B853A6F |
| dhash icon | aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla) |
| Reporter | |
| Tags: | exe Loki |
Intelligence
File Origin
# of uploads :
1
# of downloads :
127
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Doc0294585692_exe.exe
Verdict:
Suspicious activity
Analysis date:
2021-08-31 10:32:15 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Clean
Maliciousness:
Behaviour
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Sending a UDP request
Sending an HTTP GET request
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
AutoIt script contains suspicious strings
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Nymeria
Status:
Malicious
First seen:
2021-08-31 09:08:26 UTC
AV detection:
14 of 35 (40.00%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
lokipasswordstealer(pws)
Similar samples:
+ 5'593 additional samples on MalwareBazaar
Result
Malware family:
lokibot
Score:
10/10
Tags:
family:lokibot spyware stealer trojan upx
Behaviour
Modifies system certificate store
Suspicious behavior: MapViewOfSection
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Lokibot
Malware Config
C2 Extraction:
http://brokenislegion.gq/Office5/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files
SH256 hash:
c881bde7a9e19b8861793607b3e792a37d87873d2f877840ef3e26ed6b358948
MD5 hash:
b96638cb547614bd14f7fea9e16ee3c8
SHA1 hash:
7ec087a1523b9462c57990ce4f5cd7f94b32d17c
SH256 hash:
13cd902db4c2d83cf33f2d2ab048f048126f7152a8e549fa31f5deeb4f2f0294
MD5 hash:
ecc32f34e2f7dd3142a79941b96d67f0
SHA1 hash:
327fac8f44f2499bb94242791bd902d4f952adc8
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
0.85
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.