MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 91537297a441a97b92e5ad738cdfdb634d285fc5556936406cbef7a2699b4d57. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 18
| SHA256 hash: | 91537297a441a97b92e5ad738cdfdb634d285fc5556936406cbef7a2699b4d57 |
|---|---|
| SHA3-384 hash: | 7c8aa0d82430e22fd4e2aaaca00992ce964fc71727890a9774f99ee29f75122dee056f76018c7d315235e29bfbc0c60c |
| SHA1 hash: | 2626a81780d0afbab8793ac634eab0803135f988 |
| MD5 hash: | 38380cb17578697c202aa51082311ce0 |
| humanhash: | bacon-fanta-quebec-kansas |
| File name: | JOB NO. AIQ8478.bat |
| Download: | download sample |
| Signature | Loki |
| File size: | 563'720 bytes |
| First seen: | 2025-03-10 11:05:20 UTC |
| Last seen: | 2025-03-10 11:19:33 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:i/f7pm+gvyaSUZwlyeUrth3/g7F4QnLaSVCKzEzC7b9GumxckR:RYUZqye2j/g7KQLhCKzGC71mr |
| Threatray | 4'868 similar samples on MalwareBazaar |
| TLSH | T167C402A89605E413CA914B755D32F3B8227C5EECF814C3138FEDEDEBBDA6A540D58182 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| dhash icon | 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer) |
| Reporter | |
| Tags: | exe Loki |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__QueryInfo |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | HeavensGate |
|---|---|
| Author: | kevoreilly |
| Description: | Heaven's Gate: Switch from 32-bit to 64-mode |
| Rule name: | INDICATOR_KB_CERT_7c1118cbbadc95da3752c46e47a27438 |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables signed with stolen, revoked or invalid certificates |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_GENInfoStealer |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing common artifacts observed in infostealers |
| Rule name: | infostealer_loki |
|---|
| Rule name: | infostealer_xor_patterns |
|---|---|
| Author: | jeFF0Falltrades |
| Description: | The XOR and string patterns shown here appear to be unique to certain information-stealing malware families, namely LokiBot and Pony/Fareit. The XOR patterns were observed in a several loaders and payloads for LokiBot, but have also appeared (less frequently) in Pony/Fareit loaders and samples. The two accompanying rules below can be used to further classify the final payloads. |
| Rule name: | Loki |
|---|---|
| Author: | kevoreilly |
| Description: | Loki Payload |
| Rule name: | LokiBot |
|---|---|
| Author: | kevoreilly |
| Description: | LokiBot Payload |
| Rule name: | LokiPWS |
|---|---|
| Author: | NDA0E |
| Description: | Detects LokiBot |
| Rule name: | malware_Lokibot_strings |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Lokibot in memory |
| Reference: | internal research |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | STEALER_Lokibot |
|---|---|
| Author: | Marc Rivero | McAfee ATR Team |
| Description: | Rule to detect Lokibot stealer |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | Windows_Trojan_Lokibot_0f421617 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_Lokibot_1f885282 |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_lokipws_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.lokipws. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.