MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 54c49492eed556235b60ded21c2aa081178c56b28d3e4681ea253540c6c4bc96. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information 3 Yara 3 Comments

SHA256 hash: 54c49492eed556235b60ded21c2aa081178c56b28d3e4681ea253540c6c4bc96
SHA1 hash: b816dd8a0b187a4350758944a542afba96a6d266
MD5 hash: d87007a7e71867846c4fbedfcbb306bd
File name:Pending Payment_invoice no.exe
Download: download sample
Signature Loki
File size:207'360 bytes
First seen:2020-05-23 11:29:44 UTC
Last seen:2020-05-23 13:13:23 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep 6144:QbZe03AKkGqY8vrF4aiAPT7MiWNyyWlYa5pYhoCmEDrKKO:QbZe03tkWIUAL75WylPYsEHKKO
TLSH 6A14D05833A4A32FD83DA7B92054100523F2AE463A57E7498E97B5EF257B3808714FB7
Reporter @jarumlus
Tags:Loki

Intelligence


Mail intelligence No data
# of uploads 2
# of downloads 26
Origin country FR FR
ClamAV SecuriteInfo.com.MSIL.GenKryptik.ELAS.15901.UNOFFICIAL
VirusTotal:Virustotal results 24.66%

Yara Signatures


Rule name:Lokibot
Author:JPCERT/CC Incident Response Group
Description:detect Lokibot in memory
Reference:internal research
Rule name:win_lokipws_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

Executable exe 54c49492eed556235b60ded21c2aa081178c56b28d3e4681ea253540c6c4bc96

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments