MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 61469a1a12ec1dadb9f884a0f07c23d7de89e77cb687bb6919c555de6ca8dc22. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 15
| SHA256 hash: | 61469a1a12ec1dadb9f884a0f07c23d7de89e77cb687bb6919c555de6ca8dc22 |
|---|---|
| SHA3-384 hash: | 42a0edcc7a715afc304c30a34cda43cd3cd92b953e375b9b16aea63008981b32d3830efdf1421a40b0366e0a64ac214b |
| SHA1 hash: | c3ecf5f838bad309a49bcb27019ee8fb33fd3623 |
| MD5 hash: | 10397feb14b5e8aad2b1e8fd3686763c |
| humanhash: | utah-butter-dakota-july |
| File name: | vbc.exe |
| Download: | download sample |
| Signature | Loki |
| File size: | 252'416 bytes |
| First seen: | 2021-10-14 08:42:35 UTC |
| Last seen: | 2021-10-14 10:08:13 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | ea8aa8524573fdaa0fbe03cd1215da2c (2 x Loki, 1 x RedLineStealer, 1 x Smoke Loader) |
| ssdeep | 3072:AulhjgrOAFE8CpF3kmW9WtXm5tv4vmVQHboS9D98aShyuy6inoeZcECxc43E:FrjgrHGM81gtA+0Vx98aC3ScEWjE |
| Threatray | 13'422 similar samples on MalwareBazaar |
| TLSH | T10A34BF213294E7B1D4970670C829CBE15D7BFF610A3491CB7B5B3A6F2EB02C0566AF19 |
| File icon (PE): | |
| dhash icon | a9bcdcac9c8cb4ac (1 x Loki) |
| Reporter | |
| Tags: | exe Loki Lokibot |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_GENInfoStealer |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing common artifcats observed in infostealers |
| Rule name: | infostealer_loki |
|---|
| Rule name: | infostealer_xor_patterns |
|---|---|
| Author: | jeFF0Falltrades |
| Description: | The XOR and string patterns shown here appear to be unique to certain information-stealing malware families, namely LokiBot and Pony/Fareit. The XOR patterns were observed in a several loaders and payloads for LokiBot, but have also appeared (less frequently) in Pony/Fareit loaders and samples. The two accompanying rules below can be used to further classify the final payloads. |
| Rule name: | Loki |
|---|---|
| Author: | kevoreilly |
| Description: | Loki Payload |
| Rule name: | Lokibot |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Lokibot in memory |
| Reference: | internal research |
| Rule name: | STEALER_Lokibot |
|---|---|
| Author: | Marc Rivero | McAfee ATR Team |
| Description: | Rule to detect Lokibot stealer |
| Rule name: | SUSP_XORed_URL_in_EXE |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | SUSP_XORed_URL_in_EXE_RID2E46 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | win_lokipws_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.lokipws. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.