MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8ac633cce1e7ca43e127cdb82ebb3fde7defd23d7a59daf3394a2e57a3a61048. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 16


Intelligence 16 IOCs YARA 2 File information Comments

SHA256 hash: 8ac633cce1e7ca43e127cdb82ebb3fde7defd23d7a59daf3394a2e57a3a61048
SHA3-384 hash: 2bee1f48edfcb945b9397fc5dbd0d09093fc2f190a0c2ba049014d22d163bdf1b7039de4cb01f8bf5a87b8c72b726b0e
SHA1 hash: bc510c22a532cace309eb7c94208c4e8649c030f
MD5 hash: c5bafe3458d291bf09cd412eae71d481
humanhash: eighteen-sink-lemon-grey
File name:file
Download: download sample
Signature Loki
File size:829'440 bytes
First seen:2023-01-23 13:03:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 12288:GoStTmHkFrVbS45nJpaqnSnnlAhFGYQeAF7K5NrKOa3RHgkDuZk08bk53j:GtkkFrBS4ZCnlCFGYoBK5FaZg/k0
Threatray 15'194 similar samples on MalwareBazaar
TLSH T1A4059D155D9F2470FC69BE3A92FEE927D62186C106ABE570D0E46EE4D8E3280DC48F74
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter jstrosch
Tags:.NET exe Loki MSIL

Intelligence


File Origin
# of uploads :
1
# of downloads :
197
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
lokibot
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-01-23 13:05:07 UTC
Tags:
trojan lokibot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Enabling the 'hidden' option for analyzed file
Moving of the original file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
lokibot packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Lokibot
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected AntiVM3
Yara detected aPLib compressed binary
Yara detected Lokibot
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Pwsx
Status:
Malicious
First seen:
2023-01-20 19:01:14 UTC
File Type:
PE (.Net Exe)
Extracted files:
9
AV detection:
19 of 39 (48.72%)
Threat level:
  5/5
Result
Malware family:
lokibot
Score:
  10/10
Tags:
family:lokibot collection spyware stealer trojan
Behaviour
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads user/profile data of web browsers
Lokibot
Malware Config
C2 Extraction:
http://171.22.30.147/line/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files
SH256 hash:
d727285481cdf4d447a574dbb2f3dcab4e8a346bb92fcdf8335e50b90e6aae2b
MD5 hash:
93914529d1259aa4a42a32a53588afe8
SHA1 hash:
e91fe1bf88d47a9638d99e71b23414ed0cdce6f5
SH256 hash:
54d781f0dee6692c47390edf1ada295fb17a7e80ed5ccd58ab14c6ddf80a0ad8
MD5 hash:
4f6caebd865502f7c8046fbae3284c61
SHA1 hash:
be357e832bf6f61454875b37a1759cf1c5fa5ca4
SH256 hash:
3a1108ba9eb7617758c85b4795254d0b012a05d4acb5462d39363dc9f77e5eb5
MD5 hash:
8e5d2da72113328b9dbc4fd1b1ac94b6
SHA1 hash:
af5d6eb888a1646618f9b2d31f4a9dad6bdecd94
SH256 hash:
90fec7cdebe6e0f89407dcc4a6810a286f53e572a47c5a5b14d4cb7616463a4b
MD5 hash:
244cb94643ebc2c628dc7ba60f7a02cd
SHA1 hash:
9d0c6382effb52deaed7ab572a958a092e5611a4
Detections:
lokibot win_lokipws_auto win_lokipws_g0
Parent samples :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 hash:
b0d71e7dc895019cbc250f00e9989265108abece2eb20b87313972b97514aaf9
MD5 hash:
76d9687717a3508f3b55cc2702552cb9
SHA1 hash:
18d8bfc25ccdbf496b387b5f11b9d4f8288cf711
SH256 hash:
8ac633cce1e7ca43e127cdb82ebb3fde7defd23d7a59daf3394a2e57a3a61048
MD5 hash:
c5bafe3458d291bf09cd412eae71d481
SHA1 hash:
bc510c22a532cace309eb7c94208c4e8649c030f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Loki

Executable exe 8ac633cce1e7ca43e127cdb82ebb3fde7defd23d7a59daf3394a2e57a3a61048

(this sample)

  
Delivery method
Distributed via web download
  
Delivery method
Distributed via web download

Comments