MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9f06ce1718cfa4e73366f82c9488b7a4aad4ddede7d7b3b51d44667607a3961c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 4
| SHA256 hash: | 9f06ce1718cfa4e73366f82c9488b7a4aad4ddede7d7b3b51d44667607a3961c |
|---|---|
| SHA3-384 hash: | 89dfd3c770f51aab0eb9154716be958679791db9b4ce9b0291e366b5559851c9056fbf42e7625b370513f8e3b2cae82f |
| SHA1 hash: | 5708ed9bd1a412a40b9abf6178084b69e1b587f5 |
| MD5 hash: | f17efee46c4c8369b5bbd1398cc774f1 |
| humanhash: | steak-missouri-leopard-island |
| File name: | win32(11).exe |
| Download: | download sample |
| File size: | 273'169 bytes |
| First seen: | 2020-06-02 08:25:21 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 7c2c71dfce9a27650634dc8b1ca03bf0 (160 x Loki, 58 x Formbook, 55 x Adware.Generic) |
| ssdeep | 6144:RPCganNAxAIgiyf69kc7w/AWMWz1YBIX6tsjfg4RTIoi83nB4TGa67B:PanyaIgyk1/GWlOEB0oi83nBcj6d |
| Threatray | 679 similar samples on MalwareBazaar |
| TLSH | B04412193350E857DA9E097204BAE2791AB95CED098B554B1380BE9F7D332C1CF0C6EA |
| Reporter |
Intelligence
File Origin
# of uploads :
1
# of downloads :
70
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-06-02 08:36:36 UTC
AV detection:
16 of 31 (51.61%)
Threat level:
2/5
Verdict:
malicious
Similar samples:
+ 669 additional samples on MalwareBazaar
Result
Malware family:
lokibot
Score:
10/10
Tags:
family:lokibot spyware stealer trojan
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Loads dropped DLL
Blacklisted process makes network request
Lokibot
Malware Config
C2 Extraction:
http://1filesharing.ga/loky4/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
exe 9f06ce1718cfa4e73366f82c9488b7a4aad4ddede7d7b3b51d44667607a3961c
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.