MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 512af94d3f84ca2dd0a2b375011773dee464456c87ef276fed572c21d6a76a86. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: 512af94d3f84ca2dd0a2b375011773dee464456c87ef276fed572c21d6a76a86
SHA3-384 hash: ca4a947145c21e9c2f3a58448256449c1a0107595dbf4e36e9a9c60bb012cc06fe06aa4a4e44444ac257e3f42ae9c4a5
SHA1 hash: 453bfa2f6c56ef5a3dab9a8fe5256c4e480897b6
MD5 hash: c9557e7a4b56f3f8f9fc94999977e14f
humanhash: moon-avocado-michigan-colorado
File name:SecuriteInfo.com.Win32.PWSX-gen.4561.12589
Download: download sample
Signature Loki
File size:808'448 bytes
First seen:2022-11-30 05:32:24 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:v73XbjKNbZSCa9rGcFhbk4W3AOBqPwNK7sb7/sn1gSp4JZX9jqHyTK2He3W1:7bjKNFSx9xDpW3/e7w7En1gSp4TX9j
Threatray 14'159 similar samples on MalwareBazaar
TLSH T1A205F1B9365072EEC867C2BA99A45D64A72030672B17D247861365DEBE0DBC3DF108F3
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon b269d4e8ccccccd8 (8 x AgentTesla, 5 x Loki, 3 x SnakeKeylogger)
Reporter SecuriteInfoCom
Tags:exe Loki

Intelligence


File Origin
# of uploads :
1
# of downloads :
196
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
lokibot
ID:
1
File name:
PDA Query - 180397-10-23-22_pdf.7z
Verdict:
Malicious activity
Analysis date:
2022-11-30 04:40:52 UTC
Tags:
lokibot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Enabling the 'hidden' option for analyzed file
Moving of the original file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Lokibot
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AntiVM3
Yara detected aPLib compressed binary
Yara detected Lokibot
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2022-11-30 03:27:01 UTC
File Type:
PE (.Net Exe)
Extracted files:
16
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Result
Malware family:
lokibot
Score:
  10/10
Tags:
family:lokibot collection spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads user/profile data of web browsers
Lokibot
Malware Config
C2 Extraction:
http://171.22.30.147/line/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
90fec7cdebe6e0f89407dcc4a6810a286f53e572a47c5a5b14d4cb7616463a4b
MD5 hash:
244cb94643ebc2c628dc7ba60f7a02cd
SHA1 hash:
9d0c6382effb52deaed7ab572a958a092e5611a4
Detections:
lokibot win_lokipws_auto win_lokipws_g0
Parent samples :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 hash:
bf417149075bc24fc3d13a1a0b541c1bac4bb4cfeb0fcbb610a2d47d713884e2
MD5 hash:
8b58b24da802b67ccbfed40795d1460a
SHA1 hash:
8c5c70eb42f3483dc44bff518b32758131ab7db2
SH256 hash:
3624268b1bf67fd3f560f345e5171f3a2f8968a776c23816ea76fc0ef41b0f03
MD5 hash:
1619753b625e58c25b73fbf1f0bff482
SHA1 hash:
c0d7922bdbc10ef0ee1606a40c2dedd22cb180d4
SH256 hash:
4ee60523f3c5539d03eddfc2e17cbd4dbf19a18e8909d0d588ad103d6edf035b
MD5 hash:
bff6f69f0462353c9d308ccb4177a957
SHA1 hash:
7cd553cb3f39bd241ac315627c486759299fc218
SH256 hash:
d35f20ce03600f3cb89b1dd2fd37a364e286b1edf5cc7597cca0933fec3c161e
MD5 hash:
e1d651462d2ffc92c7e358f611edcf8b
SHA1 hash:
79a1cad04a29e850c8ca13ca93ef7caac805c183
SH256 hash:
512af94d3f84ca2dd0a2b375011773dee464456c87ef276fed572c21d6a76a86
MD5 hash:
c9557e7a4b56f3f8f9fc94999977e14f
SHA1 hash:
453bfa2f6c56ef5a3dab9a8fe5256c4e480897b6
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments