MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5aa774e9545c8b8ce704219aeb374be885ec8533eaa8562db4ad5118917582be. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 18


Intelligence 18 IOCs YARA 5 File information Comments

SHA256 hash: 5aa774e9545c8b8ce704219aeb374be885ec8533eaa8562db4ad5118917582be
SHA3-384 hash: 9502114cf00ae3d1f75adebc79f2a6c829580dc8812cc85cab14c9cdf8cc32a02080b1b857595e2766e8b70e6843f7bf
SHA1 hash: 65049106999cc5351c73c3a738f40417f7bc8fd0
MD5 hash: bfd948b8b91e56b10c2aab1f9f11358a
humanhash: kansas-coffee-undress-mexico
File name:5aa774e9545c8b8ce704219aeb374be885ec8533eaa8562db4ad5118917582be
Download: download sample
Signature Loki
File size:349'184 bytes
First seen:2025-10-02 11:28:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'608 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 3072:Dcg7kF5OyUiDamlkSojB300CwX7mq3dnIb+EEAAdHmiV1E4:DcUr/iOmlXojB3/ZR3ySdHmiVC
Threatray 7 similar samples on MalwareBazaar
TLSH T17A747B3362FE64F3E1148739908B161A0F61BF726933DA0E587639F52B32FC65846E46
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10522/11/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter JAMESWT_WT
Tags:exe Loki PO109228

Intelligence


File Origin
# of uploads :
1
# of downloads :
285
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
lokibot
ID:
1
File name:
Ordine di acquisto_(PO_109228)_doc.exe
Verdict:
Malicious activity
Analysis date:
2025-10-02 11:28:14 UTC
Tags:
lokibot stealer evasion trojan telegram exfiltration agenttesla qrcode ims-api generic

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a file
Сreating synchronization primitives
Reading critical registry keys
Launching a service
Changing a file
DNS request
Connection attempt
Sending an HTTP POST request
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Forced shutdown of a system process
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context base64 lokibot net_reactor obfuscated obfuscated packed packed
Verdict:
Malicious
Labled as:
MSIL/Kryptik_AGeneric.DYX trojan
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-10-01T07:29:00Z UTC
Last seen:
2025-10-03T11:21:00Z UTC
Hits:
~100
Gathering data
Gathering data
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2025-10-01 17:02:19 UTC
File Type:
PE (.Net Exe)
Extracted files:
21
AV detection:
29 of 38 (76.32%)
Threat level:
  5/5
Result
Malware family:
lokibot
Score:
  10/10
Tags:
family:lokibot collection discovery spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
System Location Discovery: System Language Discovery
ConfuserEx .NET packer
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Lokibot
Lokibot family
Malware Config
C2 Extraction:
http://montblancgroup.cfd/New/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Verdict:
Malicious
Tags:
lokibot
YARA:
n/a
Unpacked files
SH256 hash:
5aa774e9545c8b8ce704219aeb374be885ec8533eaa8562db4ad5118917582be
MD5 hash:
bfd948b8b91e56b10c2aab1f9f11358a
SHA1 hash:
65049106999cc5351c73c3a738f40417f7bc8fd0
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
f19c0ac892bc18f53706ce5a5d9fbb09c7eee837e0590b550e8b6588a3a6db66
MD5 hash:
3e1522d238b2ed6e1e1e6a210dd9b676
SHA1 hash:
0fe2d8b9c0560f313778e881cbf901146c5beb3c
SH256 hash:
47e2bd28e93c047783c899c3f76765ddb263b3062f50a55c11d32fc354b15c6b
MD5 hash:
35ab576d4acd0143eb46496dff6b5510
SHA1 hash:
b766154ec0ac6f8b1b23615954237be6b5cc4284
Detections:
win_lokipws_g0 win_lokipws_auto lokibot STEALER_Lokibot SUSP_XORed_URL_In_EXE Lokibot INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients INDICATOR_SUSPICIOUS_GENInfoStealer
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments