MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 b6e8013ddf10f21517ed41bf21b57f37f82872adc052bf94ee2592d24fdb98af. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 14
| SHA256 hash: | b6e8013ddf10f21517ed41bf21b57f37f82872adc052bf94ee2592d24fdb98af |
|---|---|
| SHA3-384 hash: | bfc669c52afb70d8e2982bf43ea2bcd7562e87a9eb62285ffc8b27b7ee34721a797932c78da37b459625ea0a6a5299d4 |
| SHA1 hash: | b6eecf1fd15636ee082d1ce5d4a4857a66832916 |
| MD5 hash: | 0695e4d3dafa007fe1f23eb50d14f202 |
| humanhash: | florida-table-queen-cola |
| File name: | 0695e4d3dafa007fe1f23eb50d14f202 |
| Download: | download sample |
| Signature | Loki |
| File size: | 284'160 bytes |
| First seen: | 2022-01-24 12:17:32 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | baf7959b9f81513c2c2d13d85a18f155 (1 x RedLineStealer, 1 x Loki, 1 x RaccoonStealer) |
| ssdeep | 3072:mUVKLICCj6yMnRVca5qY9d8M0iQyfSUV3ut59Rm/X6r9YM/h3Lfed:mBLIjj6y9e8LiDp9/K6N |
| Threatray | 7'609 similar samples on MalwareBazaar |
| TLSH | T19354CF317690C172C4C62276966FCFE14EBDBE390D65868737A827EA6F203D0252635F |
| File icon (PE): | |
| dhash icon | fcf894b4b494d9c1 (2 x Smoke Loader, 2 x Amadey, 1 x RedLineStealer) |
| Reporter | |
| Tags: | 32 exe Loki |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_GENInfoStealer |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing common artifcats observed in infostealers |
| Rule name: | infostealer_loki |
|---|
| Rule name: | infostealer_xor_patterns |
|---|---|
| Author: | jeFF0Falltrades |
| Description: | The XOR and string patterns shown here appear to be unique to certain information-stealing malware families, namely LokiBot and Pony/Fareit. The XOR patterns were observed in a several loaders and payloads for LokiBot, but have also appeared (less frequently) in Pony/Fareit loaders and samples. The two accompanying rules below can be used to further classify the final payloads. |
| Rule name: | Loki |
|---|---|
| Author: | kevoreilly |
| Description: | Loki Payload |
| Rule name: | Lokibot |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Lokibot in memory |
| Reference: | internal research |
| Rule name: | STEALER_Lokibot |
|---|---|
| Author: | Marc Rivero | McAfee ATR Team |
| Description: | Rule to detect Lokibot stealer |
| Rule name: | SUSP_XORed_URL_in_EXE |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | SUSP_XORed_URL_in_EXE_RID2E46 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects an XORed URL in an executable |
| Reference: | https://twitter.com/stvemillertime/status/1237035794973560834 |
| Rule name: | win_lokipws_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.lokipws. |
| Rule name: | XOREngine_Misc_XOR_Func |
|---|---|
| Author: | smiller cc @florian @wesley idea on implementation with yara's built in XOR function |
| Description: | Use with care, https://twitter.com/cyb3rops/status/1237042104406355968 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://103.89.90.10/googlecould/.win32.exe