MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b792cface19177dcf7adcf819da233c86442dc1eade7fdef334de8bc4c96f7af. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 16


Intelligence 16 IOCs YARA 2 File information Comments

SHA256 hash: b792cface19177dcf7adcf819da233c86442dc1eade7fdef334de8bc4c96f7af
SHA3-384 hash: 3a2c634bd3d495e44aa15c4865c3aa742ae2d1ee1d614d9ed19edb0208add783faf24f144a3d72fb2470afac6de28a4a
SHA1 hash: 33537fa5a86a7c8c7af1873c74b6aa8d0dadb827
MD5 hash: a314ce7487b212479be25e543f52cfc4
humanhash: nitrogen-spaghetti-romeo-oscar
File name:Ship Particulars_pdf.exe
Download: download sample
Signature Loki
File size:629'760 bytes
First seen:2023-01-31 09:57:29 UTC
Last seen:2023-01-31 11:37:33 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'663 x AgentTesla, 19'478 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:o5sBFjCfuXdm4S4w1gzs43HBbXiP3xN5hMNLpKqntbIEIMI:7XYwlEn0N4+b
Threatray 15'875 similar samples on MalwareBazaar
TLSH T126D423643AE9D3ADC04C467A9C746E0023B5AE01BD97CB2D3EE639CF59767900489F87
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter Anonymous
Tags:exe Loki

Intelligence


File Origin
# of uploads :
2
# of downloads :
187
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
lokibot
ID:
1
File name:
Ship Particulars_pdf.exe
Verdict:
Malicious activity
Analysis date:
2023-01-31 09:59:50 UTC
Tags:
trojan lokibot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Searching for the window
Sending a custom TCP request
Enabling the 'hidden' option for analyzed file
Moving of the original file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
lokibot packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Lokibot
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected AntiVM3
Yara detected aPLib compressed binary
Yara detected Lokibot
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-01-27 11:11:14 UTC
File Type:
PE (.Net Exe)
Extracted files:
10
AV detection:
25 of 38 (65.79%)
Threat level:
  5/5
Result
Malware family:
lokibot
Score:
  10/10
Tags:
family:lokibot collection spyware stealer trojan
Behaviour
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads user/profile data of web browsers
Lokibot
Malware Config
C2 Extraction:
http://171.22.30.147/line/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files
SH256 hash:
54d781f0dee6692c47390edf1ada295fb17a7e80ed5ccd58ab14c6ddf80a0ad8
MD5 hash:
4f6caebd865502f7c8046fbae3284c61
SHA1 hash:
be357e832bf6f61454875b37a1759cf1c5fa5ca4
SH256 hash:
eaaf7eae629687e68524ffd9179d26d0ed0446b49e037935bd6d265cf397e20d
MD5 hash:
c4c7e414d381736d5f8127a0beedfb0b
SHA1 hash:
bda619f7ad96f00c28fa37712014e35109ff39d0
SH256 hash:
411569f9f0b865c651adc1234d23f86cd98fe5cd641704702276e9882be113b6
MD5 hash:
7648892096f37af50468509c5b051180
SHA1 hash:
a56a074c2770152761f6c4975db0e9f7d57f8cda
SH256 hash:
30a89efbd254471710bcf82696a734608fd3b5f86a8c514564899dd437889f95
MD5 hash:
e18b9b429fb5e783863867408167b173
SHA1 hash:
a084a8400a851181710b71cf593ca800d19f7873
SH256 hash:
90fec7cdebe6e0f89407dcc4a6810a286f53e572a47c5a5b14d4cb7616463a4b
MD5 hash:
244cb94643ebc2c628dc7ba60f7a02cd
SHA1 hash:
9d0c6382effb52deaed7ab572a958a092e5611a4
Detections:
lokibot win_lokipws_auto win_lokipws_g0
Parent samples :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 hash:
b792cface19177dcf7adcf819da233c86442dc1eade7fdef334de8bc4c96f7af
MD5 hash:
a314ce7487b212479be25e543f52cfc4
SHA1 hash:
33537fa5a86a7c8c7af1873c74b6aa8d0dadb827
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

Executable exe b792cface19177dcf7adcf819da233c86442dc1eade7fdef334de8bc4c96f7af

(this sample)

  
Dropped by
loki
  
Delivery method
Distributed via e-mail attachment

Comments