MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ac4ac969409616f3fcbe4983cf7ef19728dbfb8ffc34e2ee39943027e1bf37ef. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 15
| SHA256 hash: | ac4ac969409616f3fcbe4983cf7ef19728dbfb8ffc34e2ee39943027e1bf37ef |
|---|---|
| SHA3-384 hash: | 1b5fe643800ff076f63aa2424e1acc0ebf746227ee978e76278cf87a2b64320fee22f10363b469757c1fe0198ed707d4 |
| SHA1 hash: | 73654c754c5c0cbe24bd47c79e968e9b6b560fcc |
| MD5 hash: | 2ee15a7119d7ce4ed2a4bae6e801ef01 |
| humanhash: | lake-hotel-fifteen-eighteen |
| File name: | 2ee15a7119d7ce4ed2a4bae6e801ef01.exe |
| Download: | download sample |
| Signature | Loki |
| File size: | 728'576 bytes |
| First seen: | 2023-03-21 11:39:14 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:4jBHnTjuWaAmXlhodTULtFcJzDyC9jfzrSuk8CYjF3GLH78j5RyRpE9t1eWPt1:CJHaAFtgcDhfzrk8+H7893tsWPt |
| Threatray | 3'988 similar samples on MalwareBazaar |
| TLSH | T1C6F4015F775C9813C2992939C1D7692403B269832337D7497DCA224A190F3EA9A4FBCF |
| TrID | 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 9.7% (.EXE) Win64 Executable (generic) (10523/12/4) 6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 4.1% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | exe Loki |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | HeavensGate |
|---|---|
| Author: | kevoreilly |
| Description: | Heaven's Gate: Switch from 32-bit to 64-mode |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_GENInfoStealer |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing common artifcats observed in infostealers |
| Rule name: | infostealer_loki |
|---|
| Rule name: | infostealer_xor_patterns |
|---|---|
| Author: | jeFF0Falltrades |
| Description: | The XOR and string patterns shown here appear to be unique to certain information-stealing malware families, namely LokiBot and Pony/Fareit. The XOR patterns were observed in a several loaders and payloads for LokiBot, but have also appeared (less frequently) in Pony/Fareit loaders and samples. The two accompanying rules below can be used to further classify the final payloads. |
| Rule name: | Loki |
|---|---|
| Author: | kevoreilly |
| Description: | Loki Payload |
| Rule name: | LokiBot |
|---|---|
| Author: | kevoreilly |
| Description: | LokiBot Payload |
| Rule name: | malware_Lokibot_strings |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Lokibot in memory |
| Reference: | internal research |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | STEALER_Lokibot |
|---|---|
| Author: | Marc Rivero | McAfee ATR Team |
| Description: | Rule to detect Lokibot stealer |
| Rule name: | Windows_Trojan_Lokibot_0f421617 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_Lokibot_1f885282 |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_lokipws_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.lokipws. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.