MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a5edaf3e781977e82b6d645cf52e3c8987a69f707f6d6ef2377d9f7546f744e9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments 1

SHA256 hash: a5edaf3e781977e82b6d645cf52e3c8987a69f707f6d6ef2377d9f7546f744e9
SHA3-384 hash: 697413872580f2e8a830990cb1c00fc76a12d041fb6b68a7cf718168cfcfb01451758f32b81e930bf8fa359c4c521f03
SHA1 hash: 4cae0929b715a34b5b7565ac243dd0505a633175
MD5 hash: 1ba29471321f0be5a3064e6c226fb80d
humanhash: coffee-bacon-equal-romeo
File name:1ba29471321f0be5a3064e6c226fb80d
Download: download sample
Signature Loki
File size:238'617 bytes
First seen:2021-08-19 09:02:47 UTC
Last seen:2021-08-19 10:29:54 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f86f9a1397ea2f648b8914df9ad78914 (4 x Formbook, 2 x Loki)
ssdeep 6144:4yvNSulGHlTYvF/Ot7HEg1qRjy/fF03px:4yvBQHjt7HEgYAne3px
Threatray 8 similar samples on MalwareBazaar
TLSH T16434F12F92E8034ED3A0C5B2157128A33D2DDF76958F40A7FF84B01A60B5AC95A37977
Reporter zbetcheckin
Tags:32 exe Loki

Intelligence


File Origin
# of uploads :
2
# of downloads :
122
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
RFQ for dural221 to korea.xlsx
Verdict:
Malicious activity
Analysis date:
2021-08-19 06:54:21 UTC
Tags:
encrypted opendir exploit CVE-2017-11882 loader trojan lokibot stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Sending a UDP request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Androm
Status:
Malicious
First seen:
2021-08-19 08:11:05 UTC
AV detection:
14 of 46 (30.43%)
Threat level:
  5/5
Result
Malware family:
lokibot
Score:
  10/10
Tags:
family:lokibot spyware stealer suricata trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Lokibot
suricata: ET MALWARE LokiBot Checkin
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
Malware Config
C2 Extraction:
http://185.227.139.5/sxisodifntose.php/XjjuWy0TVqjre
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files
SH256 hash:
567171342569dbad0927fa700b751a4053cd6430b45ebbac486d7c0b4caa2619
MD5 hash:
f9d4019e69dd4279c370a93e123c49f9
SHA1 hash:
531e39372c1005868779db9dddfb47284c3f960b
Detections:
win_lokipws_g0 win_lokipws_auto
SH256 hash:
a5edaf3e781977e82b6d645cf52e3c8987a69f707f6d6ef2377d9f7546f744e9
MD5 hash:
1ba29471321f0be5a3064e6c226fb80d
SHA1 hash:
4cae0929b715a34b5b7565ac243dd0505a633175
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Loki

Executable exe a5edaf3e781977e82b6d645cf52e3c8987a69f707f6d6ef2377d9f7546f744e9

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-08-19 09:02:48 UTC

url : hxxp://198.23.212.137/dth/vbc.exe