MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 46a26fb39083f77a088365eded45839567dd33a1623ddb6440073dbf242c8811. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 46a26fb39083f77a088365eded45839567dd33a1623ddb6440073dbf242c8811
SHA3-384 hash: 192256c221cbd04398bf70ed85794fe5c12d4be55cd9c684bb1fb187667750a557906d3d832732f2e50a541017a8f9a9
SHA1 hash: 3b27c60d0508a196d9be62b280b249fa40540838
MD5 hash: 84243049d06d0be786f560fe95392bc2
humanhash: oranges-rugby-six-glucose
File name:Updated Statement.exe
Download: download sample
Signature Loki
File size:239'152 bytes
First seen:2021-08-23 07:08:45 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f86f9a1397ea2f648b8914df9ad78914 (4 x Formbook, 2 x Loki)
ssdeep 6144:vo0Jz1zHG0QaZTbjPczio+TAOsbzRCXdrv0hNNE4:vo0Jpzm05HjPybCXKNW4
Threatray 20 similar samples on MalwareBazaar
TLSH T13F340180B33D96B8F1BC31F54241587656290CB387AF04DBD746B72A6671683D4B23AF
Reporter lowmal3
Tags:exe Loki

Intelligence


File Origin
# of uploads :
1
# of downloads :
99
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Updated Statement.rar
Verdict:
Malicious activity
Analysis date:
2021-08-19 08:09:21 UTC
Tags:
trojan lokibot stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Androm
Status:
Malicious
First seen:
2021-08-19 07:02:21 UTC
AV detection:
29 of 46 (63.04%)
Threat level:
  5/5
Result
Malware family:
lokibot
Score:
  10/10
Tags:
family:lokibot spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Lokibot
Malware Config
C2 Extraction:
http://everydaywegrind.gq/Office5/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files
SH256 hash:
46a26fb39083f77a088365eded45839567dd33a1623ddb6440073dbf242c8811
MD5 hash:
84243049d06d0be786f560fe95392bc2
SHA1 hash:
3b27c60d0508a196d9be62b280b249fa40540838
Malware family:
Lokibot
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

Executable exe 46a26fb39083f77a088365eded45839567dd33a1623ddb6440073dbf242c8811

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments