MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c5c0c1dc1b82ded99f843bdce1ab3d44bff352bcdd6c934afe80577474738a43. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 6
| SHA256 hash: | c5c0c1dc1b82ded99f843bdce1ab3d44bff352bcdd6c934afe80577474738a43 |
|---|---|
| SHA3-384 hash: | 7d362a805a905461fa9522a7e4e6887ee6804c419b34eef33015402add8bda3a1ca5355c71490fc532aeb06734c73a0b |
| SHA1 hash: | c0179168d031e16598c785dad2df098ea5cf0eee |
| MD5 hash: | e499c6056afc8e822c936888061c0b4c |
| humanhash: | massachusetts-south-skylark-moon |
| File name: | RFQ file_pdf.gz |
| Download: | download sample |
| Signature | Loki |
| File size: | 220'720 bytes |
| First seen: | 2021-07-30 15:17:17 UTC |
| Last seen: | Never |
| File type: | gz |
| MIME type: | application/gzip |
| ssdeep | 6144:d0JNlOJU3mruy38ltBWDlxYqYK6qBo2xNA:6JcN38rwDlx96qBRxO |
| TLSH | T19A2423893453C2609E53261E0B5AF225B8766F6B3ED5BFB601C804489713C9FDA376CB |
| Reporter | |
| Tags: | gz Loki |
cocaman
Malicious email (T1566.001)From: "Madiha Rasheed<madha@technogroupllc.com>" (likely spoofed)
Received: "from sg.sgalavitz.com (sg.sgalavitz.com [45.14.9.100]) "
Date: "30 Jul 2021 16:50:46 +0200"
Subject: "Request for quotation"
Attachment: "RFQ file_pdf.gz"
Intelligence
File Origin
# of uploads :
1
# of downloads :
127
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Threat name:
Win32.Spyware.Noon
Status:
Malicious
First seen:
2021-07-30 08:47:41 UTC
File Type:
Binary (Archive)
Extracted files:
3
AV detection:
18 of 28 (64.29%)
Threat level:
2/5
Detection(s):
Malicious file
Result
Malware family:
lokibot
Score:
10/10
Tags:
family:lokibot spyware stealer suricata trojan
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Lokibot
suricata: ET MALWARE LokiBot Checkin
suricata: ET MALWARE LokiBot User-Agent (Charon/Inferno)
Malware Config
C2 Extraction:
http://185.227.139.18/dsaicosaicasdi.php/rVXhi7NTm83H7
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Lokibot
Score:
0.90
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Dropping
Loki
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.