MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ade4338ff8eb7ed4b807c264a9fb7f559c9e98401de46ffdd8e0a4a502f63406. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 14
| SHA256 hash: | ade4338ff8eb7ed4b807c264a9fb7f559c9e98401de46ffdd8e0a4a502f63406 |
|---|---|
| SHA3-384 hash: | dcc6a69a5bbbed5484dba6efe006b978d42853c55ca774887ca8dddd10ccd80e9028ec6e49893cc6badfc04304c814a0 |
| SHA1 hash: | 7c9ab420d8fc9ab573b7262ec825555326c00b8c |
| MD5 hash: | 25947924b10ed813d8583f84ee01abb3 |
| humanhash: | four-idaho-pluto-zulu |
| File name: | 25947924b10ed813d8583f84ee01abb3 |
| Download: | download sample |
| Signature | Loki |
| File size: | 126'071 bytes |
| First seen: | 2022-04-28 07:48:18 UTC |
| Last seen: | 2022-07-14 07:39:40 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 56a78d55f3f7af51443e58e0ce2fb5f6 (719 x GuLoader, 451 x Formbook, 295 x Loki) |
| ssdeep | 3072:l1NjcVVnLpPunb3hRzjNdoIG50nsVMeS76vaVwXlDk:HNeZm3hppeIVsVMeS76vjZk |
| Threatray | 7'553 similar samples on MalwareBazaar |
| TLSH | T181C3011036A4C86BD8E74A310F3D66B66BBE971618584B5F3B406F0D7E332C28D1EB61 |
| TrID | 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.4% (.EXE) Win64 Executable (generic) (10523/12/4) 10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.0% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | 32 exe Loki |
Intelligence
File Origin
# of uploads :
2
# of downloads :
309
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
Сreating synchronization primitives
Reading critical registry keys
Changing a file
Creating a file in the %AppData% subdirectories
Moving a file to the %AppData% subdirectory
Enabling the 'hidden' option for recently created files
Sending a custom TCP request
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Query of malicious DNS domain
Sending an HTTP POST request to an infection source
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
control.exe formbook overlay packed python shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Loki
Verdict:
Malicious
Result
Threat name:
Lokibot
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected aPLib compressed binary
Yara detected Lokibot
Behaviour
Behavior Graph:
Detection:
lokibot
Threat name:
Win32.Trojan.NSISInject
Status:
Malicious
First seen:
2022-04-28 07:49:05 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
23 of 26 (88.46%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
lokipasswordstealer(pws)
Similar samples:
+ 7'543 additional samples on MalwareBazaar
Result
Malware family:
lokibot
Score:
10/10
Tags:
family:lokibot collection spyware stealer suricata trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Lokibot
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
suricata: ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
suricata: ET MALWARE LokiBot Checkin
suricata: ET MALWARE LokiBot Fake 404 Response
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M1
suricata: ET MALWARE LokiBot Request for C2 Commands Detected M2
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
Malware Config
C2 Extraction:
http://hyatqfuh9olahvxf.gq/BN3/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files
SH256 hash:
cc94fb3440523eb0f363a0a034868ab8b9a4a297425d43bd8e6427c3540379bd
MD5 hash:
59478e601eb5f582c79bdf8a0a8e54d9
SHA1 hash:
ec3a112e1cb3b0ff900408248c81c1ffa902f0ce
SH256 hash:
2ee1dadbd262782eaf7989aeb90833321ba02d16dd4d5d548293213fef732f76
MD5 hash:
6b8532a51d7630289cff5dec374ab028
SHA1 hash:
c3c576fbc59a5ff0d4dd6081a4125d68f87396cd
SH256 hash:
53a461ebbbb613f9aba5bb186dca8287f1c89a2bfefc7233cb19576d51a95264
MD5 hash:
548bd53ef56c188bd8b2258855f8c53a
SHA1 hash:
fcfec07e54d145d318fd3fc9182bca8e54a3b750
Detections:
win_lokipws_g0
win_lokipws_auto
Parent samples :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 hash:
ade4338ff8eb7ed4b807c264a9fb7f559c9e98401de46ffdd8e0a4a502f63406
MD5 hash:
25947924b10ed813d8583f84ee01abb3
SHA1 hash:
7c9ab420d8fc9ab573b7262ec825555326c00b8c
Malware family:
Lokibot
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://107.175.3.37/250/vbc.exe