MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8eb33d0b08f137c3aa3f66d5afe0188b9b60458f95ecf8a2f2ca3815059e2fca. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 8eb33d0b08f137c3aa3f66d5afe0188b9b60458f95ecf8a2f2ca3815059e2fca
SHA3-384 hash: 43d192066e0c671f78fac993c5d86974f9d202bec6ff7a39ef0012a03a0951cd3a0d76677af831586317a003b72dd69d
SHA1 hash: df93d11c75f2da6c65a7bfcc2c9380e7802fe74b
MD5 hash: 19f61575738fdf8a799beba1fca4efa5
humanhash: apart-wyoming-batman-johnny
File name:Faktur Bangun Nusa Mandiri.pdf.exe
Download: download sample
Signature Loki
File size:77'824 bytes
First seen:2020-04-29 16:56:53 UTC
Last seen:2020-04-29 18:12:49 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash a55f1cd2d3abd10665d8dd702cbed920 (1 x Loki)
ssdeep 768:Ap5oJwd7syzEReVMQG27PPtHamgf//UL6:li71zKPQGgtrY/N
Threatray 70 similar samples on MalwareBazaar
TLSH 78731956F0C4D0F2D659CEB71B25CF785239BD311984CE037245BB2E1E38E89B512BAA
Reporter abuse_ch
Tags:exe Loki


Avatar
abuse_ch
Malspam distributing Loki:

HELO: ptmatsuo.co.id
Sending IP: 202.74.72.84
From: Unipower | Jakarta <edy_s@karana.co.id>
Subject: COVID19-PT.UNIPOWER PRATAMA- INVOICE 098/I/IV/20- PO.9100326941
Attachment: Faktur Bangun Nusa Mandiri.pdf.gz (contains "Faktur Bangun Nusa Mandiri.pdf.exe")

Loki C2:
http://theblueprint.vn/th/Panel/fre.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
99
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Androm
Status:
Malicious
First seen:
2020-04-29 03:12:05 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
21 of 31 (67.74%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

Executable exe 8eb33d0b08f137c3aa3f66d5afe0188b9b60458f95ecf8a2f2ca3815059e2fca

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::EVENT_SINK_AddRef

Comments