MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 454a70570793e66235ed496d38c19d6d91f239899665d972c0bf42a8fe5a1563. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 16
| SHA256 hash: | 454a70570793e66235ed496d38c19d6d91f239899665d972c0bf42a8fe5a1563 |
|---|---|
| SHA3-384 hash: | 4da7aad34462350be07a1508890a0988c3a2d85a3a8edc567795df098a436593cffc6ef7ff3f3bad1719647220a31dcc |
| SHA1 hash: | bb3841b452d5531f8f8f523166db768f1b88548f |
| MD5 hash: | eccfa99709b562fab91fe44febba7096 |
| humanhash: | east-william-minnesota-five |
| File name: | SP2351521-XPev2DhzuVRXkEb-xlsx.exe |
| Download: | download sample |
| Signature | Loki |
| File size: | 637'440 bytes |
| First seen: | 2023-05-24 07:45:44 UTC |
| Last seen: | 2023-05-24 08:08:46 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger) |
| ssdeep | 12288:tybjdtPplTY6RhKuN25GpZSpR+f8lp0z2Iw6aEpICF6l68rXufR:tybjdJTDEa2sUgzTw7TCF |
| Threatray | 4'190 similar samples on MalwareBazaar |
| TLSH | T1B1D4DF997651B6CFC417CE7689982D74A611A4BB730BE303A45322EDDA0DADBCF101F2 |
| TrID | 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 9.7% (.EXE) Win64 Executable (generic) (10523/12/4) 6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 4.1% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer) |
| Reporter | |
| Tags: | exe Loki |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files
454a70570793e66235ed496d38c19d6d91f239899665d972c0bf42a8fe5a1563
9acece99f4c28d2bd3855e18ebdb8e5240be3521f89b6f0f9769c7216757e286
d896f395ac42c9894f6e2c86135275035030f8e66dc693a3c8203499db5a8bf8
d76c2fca8b28777527708567160b1561c5038257b78a8306e8377175408a9f2a
1d42e9031f45127f4dab62ac48f7774db6cfa1c785b87efdcdfa75073227b4e3
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.