MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a514741f5e99ded17c767b1159e98f86ae0b918fcff56f53d365e4744104f457. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: a514741f5e99ded17c767b1159e98f86ae0b918fcff56f53d365e4744104f457
SHA3-384 hash: 7d1a5cd8a91b3bee7b8a02f23a3f72b6579130d117e0ccf2b1098fb6f264e9f0f7c7793697c212385156ec942475a278
SHA1 hash: e108d29a51a3d87c017d5cb229b8aff25d789b7d
MD5 hash: 2893a3f5a3b146426bb18f6c3ad4bcba
humanhash: batman-tango-rugby-saturn
File name:2893a3f5a3b146426bb18f6c3ad4bcba.exe
Download: download sample
Signature Loki
File size:435'200 bytes
First seen:2021-03-31 18:27:00 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 6144:iaekSmWMWFXNf4UnpxayfTYb2doEtjKVpBJxQo6nq14e8XDE5b3nOvpD421VNv:CffdfXpUZiDjCYnqv8IVXK4Gh
Threatray 4'452 similar samples on MalwareBazaar
TLSH 4794F121A3C8AF75E1BF67791460151063F2F115D722EB5DBDE881ED0BA6F8182E7B02
Reporter abuse_ch
Tags:exe Loki

Intelligence


File Origin
# of uploads :
1
# of downloads :
101
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2893a3f5a3b146426bb18f6c3ad4bcba.exe
Verdict:
Suspicious activity
Analysis date:
2021-03-31 18:38:23 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-03-31 18:27:10 UTC
AV detection:
13 of 29 (44.83%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader loader rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Xloader Payload
Xloader
Malware Config
C2 Extraction:
http://www.okitmall.com/iu4d/
Unpacked files
SH256 hash:
d436034270fb2d5380e4fcecc1ee6c821a1701aed96045fa13f597da16be08fb
MD5 hash:
00cbf73d8b9f03417a3a32957ec64ed4
SHA1 hash:
b862eff1cf240a5ad5325fd258892e534484a6e8
SH256 hash:
a514741f5e99ded17c767b1159e98f86ae0b918fcff56f53d365e4744104f457
MD5 hash:
2893a3f5a3b146426bb18f6c3ad4bcba
SHA1 hash:
e108d29a51a3d87c017d5cb229b8aff25d789b7d
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Loki

Executable exe a514741f5e99ded17c767b1159e98f86ae0b918fcff56f53d365e4744104f457

(this sample)

  
Delivery method
Distributed via web download

Comments