MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 35ab29f2d5e9a8c1f9601de00496dcd212d47f95d635d25cfca83b20d8e4545a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 4 File information Comments

SHA256 hash: 35ab29f2d5e9a8c1f9601de00496dcd212d47f95d635d25cfca83b20d8e4545a
SHA3-384 hash: 8cc910af1fea2096741b4074bb1d26d6b79f2edbe9b2d270c2d29e8c672de13b80957d0c52593f377434928957024dff
SHA1 hash: 886b1669cdb752b5ce889c37242ddfeccc80f338
MD5 hash: 53438111ef43acb10552cab4859d8e97
humanhash: bacon-wisconsin-failed-louisiana
File name:Türkiye ?hracatç?lar Meclisi yeni belgesi ba?.exe
Download: download sample
Signature Loki
File size:628'224 bytes
First seen:2022-02-08 01:49:45 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'602 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:+FjApTYuJITshIxKUce8J/0OTP7r9r/+ppppppppppppppppppppppppppppp0G5:+FjA9FcOX1q5
TLSH T179D45BF5E56159A0DD9FAB345B32CD380F227EB9E475A02C24CD3D2B3BFA6920416067
File icon (PE):PE icon
dhash icon d4c4c4d8ccd4f0cc (241 x AgentTesla, 65 x Loki, 41 x Formbook)
Reporter abuse_ch
Tags:exe Loki


Avatar
abuse_ch
Loki C2:
http://63.250.35.245/image.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://63.250.35.245/image.php https://threatfox.abuse.ch/ioc/382077/

Intelligence


File Origin
# of uploads :
1
# of downloads :
144
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
keylogger obfuscated packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Lokibot
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large strings
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Found malware configuration
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicius Add Task From User AppData Temp
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected aPLib compressed binary
Yara detected Lokibot
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-02-08 01:50:12 UTC
File Type:
PE (.Net Exe)
Extracted files:
43
AV detection:
23 of 27 (85.19%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
lokipasswordstealer(pws)
Result
Malware family:
lokibot
Score:
  10/10
Tags:
family:lokibot collection spyware stealer trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Creates scheduled task(s)
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Enumerates physical storage devices
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Checks computer location settings
Reads user/profile data of web browsers
Lokibot
Malware Config
C2 Extraction:
http://63.250.35.245/image.php?view=29297630879715246
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files
SH256 hash:
79823e47436e129def4fba8ee225347a05b7bb27477fb1cc8be6dc9e9ce75696
MD5 hash:
39f524c1ab0eb76dfd79b2852e5e8c39
SHA1 hash:
428018e1701006744e34480b0029982a76d8a57d
SH256 hash:
0a5223e3a5688a9245ba14e6d700e952ad389c01d2b8be60a7087752927c27c2
MD5 hash:
4f1982dc7f3afb237b01659868005f4a
SHA1 hash:
3868c2561e2d77638ecd8572157eb7a7c7fe2ab8
Detections:
win_lokipws_g0 win_lokipws_auto
SH256 hash:
b6696764ce25e864fce856acf94901e355ba51c790165b83bc90c0dc45ca2c88
MD5 hash:
d49589f5d177f7716e57981cb722afa4
SHA1 hash:
165c86c43d5c48bbd4199d0d121fb0745bf110b5
SH256 hash:
35ab29f2d5e9a8c1f9601de00496dcd212d47f95d635d25cfca83b20d8e4545a
MD5 hash:
53438111ef43acb10552cab4859d8e97
SHA1 hash:
886b1669cdb752b5ce889c37242ddfeccc80f338
Detections:
win_cannon_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:dridex_halo_generated
Author:Halogen Generated Rule, Corsin Camichel
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_cannon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments