MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bed06510d878aedc81671ebf83fb2dd246f88de58514124d166e0831b4d9c4d0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: bed06510d878aedc81671ebf83fb2dd246f88de58514124d166e0831b4d9c4d0
SHA3-384 hash: 9ec323be24ea5976744182c1ef2e60c3a5b3ef5da36a0a012c3bc74f9b2162f1a0ff748436d43aff5520e6623dba0f73
SHA1 hash: 11a1be477f43c512f09b2f2a274739a690e0b070
MD5 hash: 66c82e23c32df5689c852749a9903c8a
humanhash: sixteen-saturn-blue-east
File name:Swift Copy
Download: download sample
Signature Loki
File size:102'400 bytes
First seen:2020-03-30 12:05:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f17e9c55b3ce0b553d7f8aa317b5c312 (1 x Loki)
ssdeep 1536:mfaO8SRH/YyEJf0o1bcaeMFWTkMa71DB7vr:3Rwq10m771D1r
Threatray 2'114 similar samples on MalwareBazaar
TLSH ABA3E916FE00BD64D5288EF58B758B9C53427E29AE497E4330883ECE7BF12947152D8B
Reporter abuse_ch
Tags:COVID-19 exe GuLoader Loki


Avatar
abuse_ch
COVID-19 themed malspam campaign distributing GuLoader->Loki:

HELO: merbabu.indocorp.com
Sending IP: 202.51.253.120
From: Eva farikhah <eva.ferikhah@fedex.com>
Subject: Fwd: Customer Letter FedEx- TNT -Service Adjustment due to COVID19
Attachment: Swift Copy.gz (contains "Swift Copy")

GuLoader payload URL (Loki):
https://drive.google.com/uc?export=download&id=19fcd-noyYBeZstMRhEOUUDitXJ9wfj0-

Loki C2:
http://audiosv.com/wp-admin/user/cc/Panel/fre.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
96
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Androm
Status:
Malicious
First seen:
2020-03-30 00:41:33 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
25 of 30 (83.33%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

Executable exe bed06510d878aedc81671ebf83fb2dd246f88de58514124d166e0831b4d9c4d0

(this sample)

  
Dropping
Loki
  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::__vbaObjSetAddref
MSVBVM60.DLL::EVENT_SINK_AddRef

Comments