MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8c76ca8a535aed705742cbf7619e7c5acff6e21c427d50bb4733d604536f909b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 17
| SHA256 hash: | 8c76ca8a535aed705742cbf7619e7c5acff6e21c427d50bb4733d604536f909b |
|---|---|
| SHA3-384 hash: | 25650d03d4a625bf3a010c72de7be2154f9d63e56719fe676a902127ec241e693f1be90539f5dd4eb79ecf2f132e3c2d |
| SHA1 hash: | 33a7fee50dd8fb25b7fc21e5a4c49a3df201f7da |
| MD5 hash: | 1bf9b73c459e8a0703e006716dd8222d |
| humanhash: | cup-virginia-beer-monkey |
| File name: | vbc.exe |
| Download: | download sample |
| Signature | Loki |
| File size: | 974'336 bytes |
| First seen: | 2023-02-20 15:07:10 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger) |
| ssdeep | 12288:pm0re4y7raeyUUH9wvZj2iN3rEXNlmbji9i/rGXWjFnsrQVynFK0MOoQrqU6cVtF:p3y4yZ1VrYEnrGk+RnVt4tq8NS |
| Threatray | 3'929 similar samples on MalwareBazaar |
| TLSH | T1A025AD19A7B4D6B7C59B01EF18385B0D39A435477619E22C8FB73FD292709BB35A8203 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Reporter | |
| Tags: | exe Loki |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files
68fc462e04740d53f277b168e46ab6e27f2bd1556d7959b8aa7754539c5f4de8
8c76ca8a535aed705742cbf7619e7c5acff6e21c427d50bb4733d604536f909b
1e9ff63449925560f15ca76fd3f4fc60968793fda46cfdbd0f75622f37ec800d
06d09bef82967ca153d14ccea77a869ca7cda3ba6357b302a0c69f2e1397a716
0c69a178d45b450afee622418a4a5294599de3aba419cc8b92ab4b08c28ab493
ef683b83b977511f40064d0b2b35c9147c5eb3b0b54fa538be2147fef93b3089
213733de61216a784d1133b8fcfcf7fdb5df435edad425bb3476b250a86e18f8
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.--- mail headers (sample 1) ---
Received: from smtp.kec-t.com (HELO debian-linux.kec-t.com) ([61.7.233.62])
by XXX with ESMTP; 20 Feb 2023 05:52:57 +0100
Received: by debian-linux.kec-t.com (Postfix, from userid 33)
id 1E3A6530020; Mon, 20 Feb 2023 11:26:35 +0700 (ICT)
To: undisclosed-recipients:;
Subject: RE: INQUIRY//20-02-2023
X-PHP-Originating-Script: 0:func.inc
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary="=_53723b9bc844b11ba4ac77d391801aff"
Date: Mon, 20 Feb 2023 11:26:34 +0700
From: Nandu Krishnan <purchase@transworlddubai.com>
Message-ID: <9ac5a248c1c0a5295e9395e67341b902@kec-t.com>
X-Sender: purchase@transworlddubai.com
User-Agent: RoundCube Webmail/0.3.1
--- mail headers (sample 2) ---
Received: from 30411.s.t4vps.eu ([185.69.52.170])
by XXX with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Feb 2023 03:11:08 +0100
Received: from [::1] (port=59528 helo=30411.s.t4vps.eu)
by 30411.s.t4vps.eu with esmtpa (Exim 4.93)
(envelope-from <purchase@transworlddubai.com>)
id 1pTvXo-0000T8-93; Mon, 20 Feb 2023 04:04:44 +0200
MIME-Version: 1.0
Date: Mon, 20 Feb 2023 04:04:43 +0200
From: Nandu Krishnan <info@gefyra.com.gr>
To: undisclosed-recipients:;
Subject: RE: INQUIRY//20-02-2023
Message-ID: <039a537327d805c6082aa444bb652c09@transworlddubai.com>
X-Sender: purchase@transworlddubai.com
User-Agent: Roundcube Webmail/1.3.15
Content-Type: multipart/mixed;
boundary="=_831b439dfcbb801413712a5730019dfc"
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - 30411.s.t4vps.eu
X-AntiAbuse: Original Domain - XXX
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - transworlddubai.com
X-Get-Message-Sender-Via: 30411.s.t4vps.eu: authenticated_id: info@gefyra.com.gr
X-Authenticated-Sender: 30411.s.t4vps.eu: info@gefyra.com.gr
--- mail attachments (spaces replaced with [_X]) ---
c94062b9a586d15cd884246aefb0a75b ./PO-20-02-2023.docx
--- mail attachments (JBX fileinfo) ---
filetype: Microsoft Word 2007+
filename: PO-20-02-2023.docx
md5: c94062b9a586d15cd884246aefb0a75b
sha1: 22a13b5db65f00a9e91e8c37e496df25b5276e77
sha256: 0d9a51628cb6ef7cfa6074d8c6e89f61e2321bfbb39b7ce9a2e2d1972e0e163e
--- executables dropped ---
1bf9b73c459e8a0703e006716dd8222d dropped/vbc.exe.5.dr
--- http traffic URLs ---
1 [Full request URI: hXXp://79[.]110.62.142/8891/vbc[.]exe]
1 [Full request URI: hXXp://79[.]110.62.142/O--OO[.]DOC]
--- malware config extracted ---
Malware Configuration Extractor: Lokibot {
"C2 list": ["hXXp://kbfvzoboss\.bid/alien/fre.php",
"hXXp://alphastand\.trade/alien/fre.php",
"hXXp://alphastand\.win/alien/fre.php",
"hXXp://alphastand\.top/alien/fre.php",
"208.67.105\.148/okuma/five/fre.php"]
}
Lokibot C2: "208.67.105\.148/okuma/five/fre.php"