MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 26af63b92fb96cc1540accb8babef88225a1f781506f2b6c0f7b942040ab7c9e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 16
| SHA256 hash: | 26af63b92fb96cc1540accb8babef88225a1f781506f2b6c0f7b942040ab7c9e |
|---|---|
| SHA3-384 hash: | ff761826f71fcfe62073884e23e2d9b684c77380631ff3e0170e9e0eff770e2cfdb308e92e906a6c33b903d9bf6601ec |
| SHA1 hash: | f765b1290def34263b38a1e46b41dd6e3a2c6d16 |
| MD5 hash: | bfce1c2471b74c39a21f034bd3ba0ca2 |
| humanhash: | item-glucose-mike-sixteen |
| File name: | DOCSZOE23050007Pdf.exe |
| Download: | download sample |
| Signature | Loki |
| File size: | 220'160 bytes |
| First seen: | 2023-04-26 06:50:16 UTC |
| Last seen: | 2023-05-13 22:49:56 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 4b07758d5b167b27106e05a1732f0848 (4 x Loki, 3 x Vidar, 1 x RedLineStealer) |
| ssdeep | 3072:2eo1vTNoXgeWMguPySyQ6GZiOsg+LrtkfIF4695yqkH45UgXWR:8vB9MguqLGZiOszLr6fktC7H45UgQ |
| Threatray | 4'031 similar samples on MalwareBazaar |
| TLSH | T11024CF117AE2C876C41745345424CBB8BA7DBCA09B859AD333483BBF2DB03D1467B7A6 |
| TrID | 37.3% (.EXE) Win64 Executable (generic) (10523/12/4) 17.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 16.0% (.EXE) Win32 Executable (generic) (4505/5/1) 7.3% (.ICL) Windows Icons Library (generic) (2059/9) 7.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| File icon (PE): | |
| dhash icon | 0041a90442232300 (1 x Loki) |
| Reporter | |
| Tags: | exe Loki |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | HeavensGate |
|---|---|
| Author: | kevoreilly |
| Description: | Heaven's Gate: Switch from 32-bit to 64-mode |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_GENInfoStealer |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing common artifcats observed in infostealers |
| Rule name: | infostealer_loki |
|---|
| Rule name: | infostealer_xor_patterns |
|---|---|
| Author: | jeFF0Falltrades |
| Description: | The XOR and string patterns shown here appear to be unique to certain information-stealing malware families, namely LokiBot and Pony/Fareit. The XOR patterns were observed in a several loaders and payloads for LokiBot, but have also appeared (less frequently) in Pony/Fareit loaders and samples. The two accompanying rules below can be used to further classify the final payloads. |
| Rule name: | Loki |
|---|---|
| Author: | kevoreilly |
| Description: | Loki Payload |
| Rule name: | LokiBot |
|---|---|
| Author: | kevoreilly |
| Description: | LokiBot Payload |
| Rule name: | malware_Lokibot_strings |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Lokibot in memory |
| Reference: | internal research |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | STEALER_Lokibot |
|---|---|
| Author: | Marc Rivero | McAfee ATR Team |
| Description: | Rule to detect Lokibot stealer |
| Rule name: | Windows_Trojan_Lokibot_0f421617 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_Lokibot_1f885282 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_Smokeloader_3687686f |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_lokipws_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.lokipws. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.