MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 276df8a116116425e538bfea657c789006d45a6e9f2802f396154574aa0085e3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 14
| SHA256 hash: | 276df8a116116425e538bfea657c789006d45a6e9f2802f396154574aa0085e3 |
|---|---|
| SHA3-384 hash: | ce3fa1232874a39f2ab757574d44f1c569f7616ea954eb475685b8e442888869c4982352fb7246ec7d6d758994a53417 |
| SHA1 hash: | d7d6f953700e1873d59728ae0f4aac32d33e7c88 |
| MD5 hash: | ef5105caed1d432aca814ba5eb4b9d90 |
| humanhash: | golf-lima-nuts-low |
| File name: | SecuriteInfo.com.Variant.Zusy.396701.32036.27764 |
| Download: | download sample |
| Signature | Loki |
| File size: | 207'872 bytes |
| First seen: | 2021-08-06 09:15:25 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 14314a2a561f3c740022851a022f21a4 (1 x DanaBot, 1 x Loki, 1 x RaccoonStealer) |
| ssdeep | 3072:JmZ4LE4JUUIbusMwdSLA68JI1lR5SrReX6owI8zxJWtk0+syVUI:JfLEGUL67wAPSrRgzwIoxJgTBI |
| Threatray | 8'149 similar samples on MalwareBazaar |
| TLSH | T1AF14E11C3A70CD76E55279F058AACB816A6BFC21CA3586077F5917AF3F202C12B3535A |
| dhash icon | 4839b2b4e8c38890 (137 x RaccoonStealer, 37 x Smoke Loader, 30 x RedLineStealer) |
| Reporter | |
| Tags: | exe Loki |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_GENInfoStealer |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing common artifcats observed in infostealers |
| Rule name: | infostealer_loki |
|---|
| Rule name: | infostealer_xor_patterns |
|---|---|
| Author: | jeFF0Falltrades |
| Description: | The XOR and string patterns shown here appear to be unique to certain information-stealing malware families, namely LokiBot and Pony/Fareit. The XOR patterns were observed in a several loaders and payloads for LokiBot, but have also appeared (less frequently) in Pony/Fareit loaders and samples. The two accompanying rules below can be used to further classify the final payloads. |
| Rule name: | Loki |
|---|---|
| Author: | kevoreilly |
| Description: | Loki Payload |
| Rule name: | Lokibot |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Lokibot in memory |
| Reference: | internal research |
| Rule name: | STEALER_Lokibot |
|---|---|
| Author: | Marc Rivero | McAfee ATR Team |
| Description: | Rule to detect Lokibot stealer |
| Rule name: | SUSP_XORed_URL_in_EXE |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | win_lokipws_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.lokipws. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.