MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9920c491ba7ee51f28d716713aba4d1fe05be42f0f36fe3c2b14d5612dfbf5ba. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 10
| SHA256 hash: | 9920c491ba7ee51f28d716713aba4d1fe05be42f0f36fe3c2b14d5612dfbf5ba |
|---|---|
| SHA3-384 hash: | b5be865141cec370a33562f2b9f7678665e2545f61df5e38779ee797182b4eb7d8077ed3cd25d48df851b24dbc72baee |
| SHA1 hash: | c5c2a7dea62e3de0263a2a6277e45acd61fe390c |
| MD5 hash: | d1f3aaeed43d676edefbd3e8e13006b4 |
| humanhash: | spring-florida-minnesota-batman |
| File name: | gunzipped |
| Download: | download sample |
| Signature | Loki |
| File size: | 794'624 bytes |
| First seen: | 2020-11-05 15:29:02 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 44b35562ed59f8261c188f2c511b9c99 (2 x Loki, 1 x MassLogger, 1 x HawkEye) |
| ssdeep | 12288:+X11Nb/C9GnWRV5KhjgoRth0u5SBfvoEyXaq4cBLooH:y11YGWpqdhpAYXaq4c+S |
| Threatray | 1'884 similar samples on MalwareBazaar |
| TLSH | 27F48F22F2A14C37C1632A7C9C0B57649826BED139E879476BF41C4BDF3929139292DF |
| Reporter | |
| Tags: | Loki |
abuse_ch
Malspam distributing Loki:HELO: hosting1.solusinet.id
Sending IP: 128.199.117.239
From: Customer Service (BCA Finance Customer Care) <lenny@sillomp.com>
Subject: [BCA Finance] Re: Yth. Nasabah Terima kasih atas kepercayaan Anda untuk memilih PT BCA Finance sebagai partner bagi perusahaan pembiayaan kendaraan Anda ...
Attachment: 00194.pdf.gz (contains "gunzipped")
Loki C2:
http://venitronics.com/oo/Panel/fre.php
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files
83da309c7fb81eeb13a90121d49fa67c885c9622b24757457191c05a19a639b1
faca678e809291becfc006895ab61429136a664df87026ba22fa3517c7ff86b5
2d0dc2d153fec6c07244624c2a1d6d91582faace5abbda88906f13a59d8dc2e6
c1adeb2ad54d0487b6898b1058fded42c3f1616f61bab6f63b0f3b63267b0fa6
febb61c79a935f146e6c30c01a14a3564ce16f96fa2db0593096fc74967d9061
2d817b4da7a7d421285c53b703bbcfad9d35d5a124e53d7cca97c7bbc60a626e
580e2cee4eaf9102e25345a5d152f57a98b1d9299983d176575115ac6267f04e
2bfd0ddef64f13910926dd26f53125f02de386d628be9363ec7fee11fde3d665
da79af644ccddeea2cc0119a13156dc16958097308c4ff55f387e49298c1f87f
9920c491ba7ee51f28d716713aba4d1fe05be42f0f36fe3c2b14d5612dfbf5ba
c73b7c586cfd3135f0dad99b1853268c4ab3187f75f312617c7d69c6c8e79486
a6769bb52e8d65f4d175984ee03cc5a7fe82ed2c3b84580c30eaf50ba7ad0740
23d56a67000015a67da20a8e81a158a163ceb4775fb83daa5526211f45fcce9b
c13d784e17b1aab743d94f423e53451a8168885c87595d24b2d149f4983249ed
5a9f4b0a5de0576a2f040ab75b91003b66f290d5f4a45f57b9edbbbb7a0135c6
85c43d1db3bd5caff582860d163c42e25742416b8bbe4cf41e3dda656207e58a
ab6b10d1cb5ffb696b169ac46097d9b247d2496bef211986684f7c0b105e510b
36e8ae6553663f1379d8208632f1608a826c994ec9bcbbad918ec5ef454f644a
b1460783d1048f390627468cd3426e4ade7a43b9e096a75b7524fe715443bd00
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Email_stealer_bin_mem |
|---|---|
| Author: | James_inthe_box |
| Description: | Email in files like avemaria |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_GENInfoStealer |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing common artifcats observed in infostealers |
| Rule name: | infostealer_loki |
|---|
| Rule name: | infostealer_xor_patterns |
|---|---|
| Author: | jeFF0Falltrades |
| Description: | The XOR and string patterns shown here appear to be unique to certain information-stealing malware families, namely LokiBot and Pony/Fareit. The XOR patterns were observed in a several loaders and payloads for LokiBot, but have also appeared (less frequently) in Pony/Fareit loaders and samples. The two accompanying rules below can be used to further classify the final payloads. |
| Rule name: | Loki |
|---|---|
| Author: | kevoreilly |
| Description: | Loki Payload |
| Rule name: | Lokibot |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Lokibot in memory |
| Reference: | internal research |
| Rule name: | STEALER_Lokibot |
|---|---|
| Author: | Marc Rivero | McAfee ATR Team |
| Description: | Rule to detect Lokibot stealer |
| Rule name: | win_lokipws_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | autogenerated rule brought to you by yara-signator |
| Rule name: | with_sqlite |
|---|---|
| Author: | Julian J. Gonzalez <info@seguridadparatodos.es> |
| Description: | Rule to detect the presence of SQLite data in raw image |
| Reference: | http://www.st2labs.com |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
99303b681fff011c56fd585bec580add
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.