MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a97d398040bb63c1ad86451ee043dfe518fc4a53a4415ea427a7a025a69888b5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 15
| SHA256 hash: | a97d398040bb63c1ad86451ee043dfe518fc4a53a4415ea427a7a025a69888b5 |
|---|---|
| SHA3-384 hash: | 4394b0bcea52aa9fc7efdd08b04c6d3c852f9cf0f29c96a0b32c4f32cf206e2a2a91675598abdd9b44342c2c3c6fe2cb |
| SHA1 hash: | fd6f4648588500edb7217c5db758424717a8ecd9 |
| MD5 hash: | e047f7310ed8154376d8cc22a02223fc |
| humanhash: | don-utah-twelve-apart |
| File name: | e047f7310ed8154376d8cc22a02223fc.exe |
| Download: | download sample |
| Signature | Loki |
| File size: | 359'936 bytes |
| First seen: | 2023-04-17 07:39:05 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 507dd4a49d032bd474a158854d830d17 (2 x Smoke Loader, 2 x Loki, 1 x Stop) |
| ssdeep | 6144:a31v6zHjawWbSMQkLO/2H0iRgLapJEO1hAZ+f2:a35uDawWbSELYG0iRgyL |
| Threatray | 4'094 similar samples on MalwareBazaar |
| TLSH | T121746D1213E1A87CD5264A718E1EC6F8665FF6605F567ADB33585A3F0A702E1C232FC8 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 0044111929250c11 (1 x Loki) |
| Reporter | |
| Tags: | exe Loki |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files
9c50fe80a314898db5b4849b8bf2523e6e943376a4832d1943d0c12d5e7d5b8d
72291fd7befce6c37a8b6b8ad7b5b96a1b428356d365f7d3bdcd9c4dacce27c1
e37c9f95987366f5222f9bf77421e6e3b81684f93eea9c1a947d29dc6210d98e
88e7e6f23a45b8878b45a1beecb9152c88d715be23eb837f22ca8b5ca9a448b4
35d73f1132978e70d922aed106443aaed23b9cc9d56a65940ca8f6242108c255
62082dca80037bfed588756bdc0712791e9650eb9f2dd68a5b12d376fa70e13a
222e95bb9306c62ed33d1385515aace6a020f71aecff8a3182b80a65d4861e92
4669e3e29315d6c6a58e7911bb6776ce27ee9619261829b4f6c7d7c2d1c991aa
6de21eb1f1300e1b33206abb2a1af488f16305bc4be7265e17b5fc68b3cd2632
a97d398040bb63c1ad86451ee043dfe518fc4a53a4415ea427a7a025a69888b5
99785489b3e1cee3004a5f4fd2421ddfa773bfd1d023cbbd2f307f2846bbb318
b72c3f63e398549c2072002525e09f483c6c117a511d32774f66387d0552cc92
3d716133c3c55ae857daad8b387cb60c20415b30664c3872be02f7c52d95b4cc
ceb8f84e52d2bda9f7916cbcaaf7437d65abd80ff0d3e218fcf863ca2895ecee
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | HeavensGate |
|---|---|
| Author: | kevoreilly |
| Description: | Heaven's Gate: Switch from 32-bit to 64-mode |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_GENInfoStealer |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing common artifcats observed in infostealers |
| Rule name: | infostealer_loki |
|---|
| Rule name: | infostealer_xor_patterns |
|---|---|
| Author: | jeFF0Falltrades |
| Description: | The XOR and string patterns shown here appear to be unique to certain information-stealing malware families, namely LokiBot and Pony/Fareit. The XOR patterns were observed in a several loaders and payloads for LokiBot, but have also appeared (less frequently) in Pony/Fareit loaders and samples. The two accompanying rules below can be used to further classify the final payloads. |
| Rule name: | Loki |
|---|---|
| Author: | kevoreilly |
| Description: | Loki Payload |
| Rule name: | LokiBot |
|---|---|
| Author: | kevoreilly |
| Description: | LokiBot Payload |
| Rule name: | malware_Lokibot_strings |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Lokibot in memory |
| Reference: | internal research |
| Rule name: | STEALER_Lokibot |
|---|---|
| Author: | Marc Rivero | McAfee ATR Team |
| Description: | Rule to detect Lokibot stealer |
| Rule name: | Windows_Trojan_Lokibot_0f421617 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_Lokibot_1f885282 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_Smokeloader_3687686f |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_lokipws_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.lokipws. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.