MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9ec0497927b9737d71ff1974665ba63edae46533202dab36c23b5b57c7597146. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 13
| SHA256 hash: | 9ec0497927b9737d71ff1974665ba63edae46533202dab36c23b5b57c7597146 |
|---|---|
| SHA3-384 hash: | f28cb18c7a753346bac4f0275a0d211490dd5ae86bffdc28ae053797d2a4e69c40d8c238c4837851e3c549ef06961062 |
| SHA1 hash: | a75b4e399c15ea7f0c98b31239ed8b8f62137d63 |
| MD5 hash: | 4a9b0ebcc910cf59f627e94b8d410fe5 |
| humanhash: | zebra-fish-wisconsin-helium |
| File name: | 4a9b0ebcc910cf59f627e94b8d410fe5.exe |
| Download: | download sample |
| Signature | Loki |
| File size: | 670'208 bytes |
| First seen: | 2021-08-31 08:53:35 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'650 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger) |
| ssdeep | 6144:obpsUEqQ/sXVhi28mEllTcpTfGDhLPp6HnIPFgruGLvKF5Qy0rkE:oNsUPQUlhl8mEllTSM9BSnZSYRX |
| Threatray | 4'552 similar samples on MalwareBazaar |
| TLSH | T17FE4FC7F19BDA2278175C6F58BE38827F0108B6F3110696476D343664326A7AB4F336E |
| Reporter | |
| Tags: | exe Loki |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://checkvim.com/fd3/fre.php | https://threatfox.abuse.ch/ioc/203455/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files
25090850b697f62e5653403538224825541b1a9a1cbc347700e18c9dfb1d67c7
9ec0497927b9737d71ff1974665ba63edae46533202dab36c23b5b57c7597146
a6fe1b5f0136250eee45dc63e29358b762d19bc8e25cf9fa2a99fbf4bf608a18
90f93b1a2d9db42cfdf15a43969eca6828c11a1ed9a1c0358bdbabf0de88e739
9ee2d9fa81f867c19beae4747b32d276f5b09e325759babb78f39336f5ae23a7
135ecfd293ccd2b23f29fe2caa223df6d827ec6a11669608361e61ccee2b99e9
a07487a2bdd1f4888e04e88234235f08eeecdf5f421e8f2e84170d291595418e
78a0715871efd92e83a6538bd479ae4ad347107e6adfb20cf655e61181585d96
06f79ffcfd99529684e39c3cf6b07219f9ddd6b76952af83bc96adc7aecf442b
d58bd22ab960017dd07c9efd5c4da79760a02a14efbc86c74e393c2682a85058
b65b34a54593add5ada0cc781f370a27c19af92ff0f2621b1539efd90a001cde
c1d9b04bca7264c76a2eae6357f6a2fc931237f374db992a926db9dd714b85c5
f4fac38f145a5b369bf01511466f7fbafc0fa12abdde0f5838321885cb252f9e
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture |
|---|---|
| Author: | ditekSHen |
| Description: | Detect executables with stomped PE compilation timestamp that is greater than local current time |
| Rule name: | pe_imphash |
|---|
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.