MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 55e90517e648293862e209451265dabb3bc859b0eef09b90fd621e2b157e6aef. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 18


Intelligence 18 IOCs YARA 3 File information Comments

SHA256 hash: 55e90517e648293862e209451265dabb3bc859b0eef09b90fd621e2b157e6aef
SHA3-384 hash: 8f02383b24812803324c5aaac7abd12fe70e1f6b4afcbbfa3766262b6256f3e29cb8a1d794447b0c69f127c6a4ec76be
SHA1 hash: f5fbf4de44dc5e4b19534826e0d4fe649038353d
MD5 hash: 309b57d23d6ee3e74eaf0504a5326966
humanhash: bakerloo-ten-avocado-fillet
File name:Purchase Order (P.O.) No.4036041334.doc.exe
Download: download sample
Signature Loki
File size:614'912 bytes
First seen:2023-09-25 13:36:02 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bf5a4aa99e5b160f8521cadd6bfe73b8 (432 x RedLineStealer, 31 x AgentTesla, 12 x DCRat)
ssdeep 12288:Mh1Lk70TnvjcSAtjiwMEUnZw3U8+hu8zqiKFZgP9eN:4k70TrcS+PMfw3U/zzqXzgPY
TLSH T13FD4F1553081C276C5A636F044F5DAA69A393CB10735C2C3B6F93BA56E312D3DEA22CD
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 174f4559191b1b13 (81 x AgentTesla, 68 x Formbook, 34 x SnakeKeylogger)
Reporter lowmal3
Tags:exe Loki

Intelligence


File Origin
# of uploads :
1
# of downloads :
370
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
lokibot
ID:
1
File name:
Purchase Order (P.O.) No.4036041334.doc.exe
Verdict:
Malicious activity
Analysis date:
2023-09-25 13:38:53 UTC
Tags:
trojan lokibot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Creating a file
Сreating synchronization primitives
Reading critical registry keys
Changing a file
DNS request
Sending an HTTP POST request
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Sending a custom TCP request
Stealing user critical data
Unauthorized injection to a system process
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control greyware lolbin masquerade net_reactor packed packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Lokibot, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected aPLib compressed binary
Yara detected Lokibot
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Vigorf
Status:
Malicious
First seen:
2023-09-25 09:31:25 UTC
File Type:
PE (Exe)
Extracted files:
9
AV detection:
18 of 23 (78.26%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
lokibot
Score:
  10/10
Tags:
family:lokibot collection spyware stealer trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Lokibot
Malware Config
C2 Extraction:
http://alimatata.topendpower.top/_errorpages/alimatata/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files
SH256 hash:
eabbdcc6e931ac26a2004439288248187051c56799fc9f0384e96b08d844f51f
MD5 hash:
c37322160a2325f072c90fcba1cd2730
SHA1 hash:
e006bb4b3f42046862c4077ce0863a4325a5f7e0
SH256 hash:
f5946a4ee1c77d059ca95a55190dfad65a0c1e9af6c2af90dfb27df925cae166
MD5 hash:
2c6aa13baf3ab581baecde8d34e0a6bd
SHA1 hash:
86e175f19a02a23c67730df1aaacf8375746e742
SH256 hash:
9164eac99b53335f037a535a063f218558b4bfa7d15f7f699f2ff20d64d6c39d
MD5 hash:
34244d6368e6fbc2e3764b1486a78f5f
SHA1 hash:
5e5c1d7ad621385f7c693e59b9e60d2ff28012d3
Detections:
lokibot win_lokipws_auto win_lokipws_g0
SH256 hash:
7073b571fc7ca99caf7cd682cd83bd5fccf6c5844a904d14771c80ce23f43407
MD5 hash:
a373110b8e721c4b3822711e21e6b178
SHA1 hash:
3dc351b0b3c2528b1c7ee58ddbe067b37428fc8d
SH256 hash:
55e90517e648293862e209451265dabb3bc859b0eef09b90fd621e2b157e6aef
MD5 hash:
309b57d23d6ee3e74eaf0504a5326966
SHA1 hash:
f5fbf4de44dc5e4b19534826e0d4fe649038353d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MAL_Malware_Imphash_Mar23_1
Author:Arnim Rupp
Description:Detects malware by known bad imphash or rich_pe_header_hash
Reference:https://yaraify.abuse.ch/statistics/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

Executable exe 55e90517e648293862e209451265dabb3bc859b0eef09b90fd621e2b157e6aef

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments