MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 461c50ee2ec33b751db85f56cd984d3c46be64d78f96b3f9c9bf122112b6d76f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 15
| SHA256 hash: | 461c50ee2ec33b751db85f56cd984d3c46be64d78f96b3f9c9bf122112b6d76f |
|---|---|
| SHA3-384 hash: | fb68245fb793cd8012f03dc34725fcecc8916bcfacfbf698601473a4b062d55f3d63e1350cb2ba489734bced9031bb10 |
| SHA1 hash: | 980cf12b5631a55bc237f12933843a975f30b439 |
| MD5 hash: | bfb27127c280ddaf188b3fffd35760ff |
| humanhash: | five-mexico-blue-happy |
| File name: | triage_dropped_file |
| Download: | download sample |
| Signature | Loki |
| File size: | 199'680 bytes |
| First seen: | 2021-11-22 12:28:33 UTC |
| Last seen: | 2021-11-23 15:10:54 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | d1bfe1850bd73f3d3b006c3f4b37a341 (7 x RedLineStealer, 1 x Loki, 1 x DanaBot) |
| ssdeep | 3072:67lz4QETqc8D2Gnfe8i79UmSEsSVkaequcEJ6+qXEGwYiK4:Y8qc8aGf4761EsSVklqutmEt/K |
| Threatray | 6'574 similar samples on MalwareBazaar |
| TLSH | T1AD14BE213BE2D772E5A7437064B08BA11A7B7C326AF5414F3778232E5EB12D05EA6353 |
| File icon (PE): | |
| dhash icon | fcfcb4d4d4d4d8c0 (70 x RedLineStealer, 59 x RaccoonStealer, 24 x Smoke Loader) |
| Reporter | |
| Tags: | exe Loki Lokibot |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_GENInfoStealer |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing common artifcats observed in infostealers |
| Rule name: | infostealer_loki |
|---|
| Rule name: | infostealer_xor_patterns |
|---|---|
| Author: | jeFF0Falltrades |
| Description: | The XOR and string patterns shown here appear to be unique to certain information-stealing malware families, namely LokiBot and Pony/Fareit. The XOR patterns were observed in a several loaders and payloads for LokiBot, but have also appeared (less frequently) in Pony/Fareit loaders and samples. The two accompanying rules below can be used to further classify the final payloads. |
| Rule name: | Loki |
|---|---|
| Author: | kevoreilly |
| Description: | Loki Payload |
| Rule name: | Lokibot |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Lokibot in memory |
| Reference: | internal research |
| Rule name: | STEALER_Lokibot |
|---|---|
| Author: | Marc Rivero | McAfee ATR Team |
| Description: | Rule to detect Lokibot stealer |
| Rule name: | SUSP_XORed_URL_in_EXE |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | SUSP_XORed_URL_in_EXE_RID2E46 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | win_lokipws_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.lokipws. |
| Rule name: | XOREngine_Misc_XOR_Func |
|---|---|
| Author: | smiller cc @florian @wesley idea on implementation with yara's built in XOR function |
| Description: | Use with care, https://twitter.com/cyb3rops/status/1237042104406355968 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.