MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 163658a6ee255f717f46ae8d030a75b0b0e5f53907b8f8b91d4f07fd32b94972. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 18
| SHA256 hash: | 163658a6ee255f717f46ae8d030a75b0b0e5f53907b8f8b91d4f07fd32b94972 |
|---|---|
| SHA3-384 hash: | db688cdcda4483d30feba3d0f8c4d7fb0ca113a1e108d7cd8f64728450962a27ea63d995397db8f36fa6fc83ad92e4be |
| SHA1 hash: | f99ec5bcaf78d6642f4a82375eba9c3b51b9d3f9 |
| MD5 hash: | e116606e6c959f67a099850beef0fcd9 |
| humanhash: | eight-summer-island-blue |
| File name: | FG98765456700098000000.exe |
| Download: | download sample |
| Signature | Loki |
| File size: | 1'545'216 bytes |
| First seen: | 2025-09-16 09:30:02 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 63a7884deadb0f34accabcb21cf8585a (2 x RemcosRAT, 1 x Loki) |
| ssdeep | 24576:CqlGVZjzBFArK+QlTeczEfvjJTEj3vTpso9TeczEfvjJTEj3vTpsoN:C7xTj4VInTj4VIT |
| Threatray | 4'401 similar samples on MalwareBazaar |
| TLSH | T10C65E1767A919872C1263538CCC6D78859297EF02F24AD5B3ADC3C8C0F397DA253A15B |
| TrID | 95.7% (.EXE) Win32 Executable Borland Delphi 7 (664796/42/58) 1.5% (.EXE) Win64 Executable (generic) (10522/11/4) 0.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 0.6% (.EXE) Win32 Executable (generic) (4504/4/1) 0.2% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| Magika | pebin |
| Reporter | |
| Tags: | exe Loki |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
caa92a31b30f0105856e28e65218fe2fec26f5903f10dbaeeab0e331cf267854
163658a6ee255f717f46ae8d030a75b0b0e5f53907b8f8b91d4f07fd32b94972
b39df39579ecb80331677bf1a9c36a857fc48f8658839987af4493ff4e73efa9
f1306c781600196b1b5a5f25d2fb8e3e9282777f97a94ed0774db8a6d0ca57c7
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Borland |
|---|---|
| Author: | malware-lu |
| Rule name: | CP_AllMal_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication |
| Rule name: | CP_Script_Inject_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
| Rule name: | MD5_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
| Rule name: | pe_detect_tls_callbacks |
|---|
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.