MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 13cd902db4c2d83cf33f2d2ab048f048126f7152a8e549fa31f5deeb4f2f0294. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 13cd902db4c2d83cf33f2d2ab048f048126f7152a8e549fa31f5deeb4f2f0294
SHA3-384 hash: 102785186076610144a8082b170cd124a1239f3d2e79a05a2d7b75b5e3e5ba0e7d584de64f40f19d4282956eef81a4e1
SHA1 hash: 327fac8f44f2499bb94242791bd902d4f952adc8
MD5 hash: ecc32f34e2f7dd3142a79941b96d67f0
humanhash: washington-minnesota-nuts-april
File name:Doc0294585692_exe.exe
Download: download sample
Signature Loki
File size:377'344 bytes
First seen:2021-08-31 10:25:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ef471c0edf1877cd5a881a6a8bf647b9 (74 x Formbook, 33 x Loki, 29 x Loda)
ssdeep 6144:I4XrK9PX7Fp6Gh2wWRGl0EDDf1PisZQ5rAGQwg1QtP1f4paaYlsdcaMJEdbI0Pz9:XXe9PPlowWX0t6mOQwg1Qd15CcYk0Wet
Threatray 5'603 similar samples on MalwareBazaar
TLSH T1E984124548C4CCA6E71AB370D0B7CF9819757832CCD66B689754EA2EB870343B853A6F
dhash icon aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla)
Reporter GovCERT_CH
Tags:exe Loki

Intelligence


File Origin
# of uploads :
1
# of downloads :
127
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Doc0294585692_exe.exe
Verdict:
Suspicious activity
Analysis date:
2021-08-31 10:32:15 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Sending a UDP request
Sending an HTTP GET request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
AutoIt script contains suspicious strings
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Nymeria
Status:
Malicious
First seen:
2021-08-31 09:08:26 UTC
AV detection:
14 of 35 (40.00%)
Threat level:
  5/5
Result
Malware family:
lokibot
Score:
  10/10
Tags:
family:lokibot spyware stealer trojan upx
Behaviour
Modifies system certificate store
Suspicious behavior: MapViewOfSection
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Lokibot
Malware Config
C2 Extraction:
http://brokenislegion.gq/Office5/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files
SH256 hash:
c881bde7a9e19b8861793607b3e792a37d87873d2f877840ef3e26ed6b358948
MD5 hash:
b96638cb547614bd14f7fea9e16ee3c8
SHA1 hash:
7ec087a1523b9462c57990ce4f5cd7f94b32d17c
SH256 hash:
13cd902db4c2d83cf33f2d2ab048f048126f7152a8e549fa31f5deeb4f2f0294
MD5 hash:
ecc32f34e2f7dd3142a79941b96d67f0
SHA1 hash:
327fac8f44f2499bb94242791bd902d4f952adc8
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

Executable exe 13cd902db4c2d83cf33f2d2ab048f048126f7152a8e549fa31f5deeb4f2f0294

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments