MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 45984cca17b80fe031a8edcc982829cf25412df283273f1b74198bd57715988c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 16


Intelligence 16 IOCs YARA 2 File information Comments

SHA256 hash: 45984cca17b80fe031a8edcc982829cf25412df283273f1b74198bd57715988c
SHA3-384 hash: 6b3505a0d18a0f784d6a0368ba1821ce8066b123bf2bd96225bc452afd7a907db9e5c934ca618d61b90d5859f028ea9b
SHA1 hash: 070508dbacfad86942aa4e3377b2dac666383af1
MD5 hash: aacd57bbd3f722b78da7982bd4c511e2
humanhash: bulldog-video-eight-finch
File name:aacd57bbd3f722b78da7982bd4c511e2.exe
Download: download sample
Signature Loki
File size:800'768 bytes
First seen:2022-12-07 11:59:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:RooQgKZ/nXt7virmWhlGLaQYIQZ+JAugX+ICSdBRO6rcwuAnCbD2gT5AeIGYwQ85:RB8Jg3nORwu4WAeIGY6
Threatray 13'904 similar samples on MalwareBazaar
TLSH T1C305C62F8ED3A5D4ED3787F8B2559BB83D62B3C1A8A51C0568A09033014C53EB76FDA5
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter abuse_ch
Tags:exe Loki

Intelligence


File Origin
# of uploads :
1
# of downloads :
177
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
lokibot
ID:
1
File name:
aacd57bbd3f722b78da7982bd4c511e2.exe
Verdict:
Malicious activity
Analysis date:
2022-12-07 12:04:42 UTC
Tags:
trojan lokibot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Creating a file
Сreating synchronization primitives
Reading critical registry keys
Changing a file
Enabling the 'hidden' option for analyzed file
Stealing user critical data
Moving of the original file
Sending an HTTP POST request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Lokibot
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AntiVM3
Yara detected aPLib compressed binary
Yara detected Lokibot
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-12-07 09:22:31 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Result
Malware family:
lokibot
Score:
  10/10
Tags:
family:lokibot collection spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads user/profile data of web browsers
Lokibot
Malware Config
C2 Extraction:
http://171.22.30.147/gk1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
b87ebab5165ff2f8c6346beaadd03259cd3d157f372dac5769dc0ddaf545ed28
MD5 hash:
875295f62215f3b8a7a98b5a282338be
SHA1 hash:
d2a72a06a82131e59c9b0c2434ce567ff30cf799
SH256 hash:
072bafe83d2a9c1e68c1675f13b8e5eb061b8033353a7555a6aa41fcf5dea886
MD5 hash:
6eae82e70a2e35e07f10c31e9328ebc5
SHA1 hash:
91c3942853029ebcbc56101d7550c8b7c6b35ac1
Detections:
lokibot win_lokipws_auto win_lokipws_g0
Parent samples :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 hash:
119d5863423f9c794c350c2b474e4a3bfd0bbee419c7c99928117af5ae30ea31
MD5 hash:
6eafdbfef6557c70a7738365e1015c8d
SHA1 hash:
7a5a55ca89fe3234d6e3873737ee08a3588db094
SH256 hash:
1d5847c2b040bcd39cc41d39165fe646cccd8e0f142e504d0c84ba6c5734ae06
MD5 hash:
980b0882d93acd3a81a43a88fb70470b
SHA1 hash:
4af1b886a2830018bb0b49847e42e67d7da96d74
SH256 hash:
340ba2312d5cdfc3d89f3f35f627187dcb406e5afea134bc76b04f52f4285df3
MD5 hash:
85f9290aa8900e9fd74b01ee23125706
SHA1 hash:
310eb5e4aea5471b74a6385f1da283b9d8e3d698
SH256 hash:
45984cca17b80fe031a8edcc982829cf25412df283273f1b74198bd57715988c
MD5 hash:
aacd57bbd3f722b78da7982bd4c511e2
SHA1 hash:
070508dbacfad86942aa4e3377b2dac666383af1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Loki

Executable exe 45984cca17b80fe031a8edcc982829cf25412df283273f1b74198bd57715988c

(this sample)

  
Delivery method
Distributed via web download

Comments