MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3aac90951422fd8e305752fb6dd8254c05585a7c582fbe3e994a901acd99d90f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 3aac90951422fd8e305752fb6dd8254c05585a7c582fbe3e994a901acd99d90f
SHA3-384 hash: 408d523e46c9686cd4ed6edb9109e8a618c2fa62272877d1073befe51e4c5cf0e8d5fe819234194b8d3f2d8ceefe6536
SHA1 hash: 2e1a7264d49b5aa70be8b68440562b8855d8efae
MD5 hash: 9d4ebfd1f1869b91f5f3f7ce295c9f56
humanhash: summer-batman-mirror-tennessee
File name:9d4ebfd1f1869b91f5f3f7ce295c9f56.exe
Download: download sample
Signature Loki
File size:68'608 bytes
First seen:2021-02-03 18:34:12 UTC
Last seen:2021-02-03 21:01:33 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 1536:dAW0KhrBo7C/tV/XxJHvRhvgwTSZ4v0srvI:dAW0mo7C/tV/BJkBBsrvI
Threatray 2 similar samples on MalwareBazaar
TLSH B063184F279CB151D1A22A764A26EB712728A6B15C50CD09B44FC30DEF905FB6CCC6DB
Reporter abuse_ch
Tags:exe Loki

Intelligence


File Origin
# of uploads :
2
# of downloads :
155
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
327c75ee-97dc-48b4-330c-08d8c7debe33cf7a1859-2810-1fe8-faa7-ad7d21eecc61.eml
Verdict:
Malicious activity
Analysis date:
2021-02-03 07:15:56 UTC
Tags:
trojan exploit CVE-2017-11882 opendir loader lokibot stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Sending a UDP request
Connection attempt to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
60 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Exploit.CVE-2017-11882
Status:
Malicious
First seen:
2021-02-03 03:28:54 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
3aac90951422fd8e305752fb6dd8254c05585a7c582fbe3e994a901acd99d90f
MD5 hash:
9d4ebfd1f1869b91f5f3f7ce295c9f56
SHA1 hash:
2e1a7264d49b5aa70be8b68440562b8855d8efae
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Loki

Executable exe 3aac90951422fd8e305752fb6dd8254c05585a7c582fbe3e994a901acd99d90f

(this sample)

  
Delivery method
Distributed via web download

Comments