MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ca2a87b0664849a8f35d69cabebb190ca348c84db69196c9a3da45952bc16905. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 16
| SHA256 hash: | ca2a87b0664849a8f35d69cabebb190ca348c84db69196c9a3da45952bc16905 |
|---|---|
| SHA3-384 hash: | e53ed7f4b7d65a3dc1f7940cd8023db11c1a65bab70f56146bc8881246b1d3467fbcd33813629e4177934bbf2540ae02 |
| SHA1 hash: | 5bd24027dd1ac9ab9ea786bdf02cc157661dbb76 |
| MD5 hash: | 1e7c6b3a5cbc9bca9af96ac238da074c |
| humanhash: | blue-butter-black-dakota |
| File name: | 1e7c6b3a5cbc9bca9af96ac238da074c |
| Download: | download sample |
| Signature | Loki |
| File size: | 266'752 bytes |
| First seen: | 2022-01-31 05:28:01 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | b54f072419f24418258899aa1cee7821 (3 x Loki, 1 x Smoke Loader) |
| ssdeep | 3072:IUnul8Yh1OTuVLs5cByyoeR9tKYJh3QWgHp3smt4VggjcGkNIVqI:IUsTcCDByyoedK0hydK7ITsq |
| Threatray | 7'834 similar samples on MalwareBazaar |
| TLSH | T16544D0D07690C072C35335758839CBB19B3EFC32E961D9073BBA1A2E5E712F09A5A746 |
| File icon (PE): | |
| dhash icon | fcf8b4b4b4d4d9c1 (6 x RedLineStealer, 4 x Smoke Loader, 2 x RaccoonStealer) |
| Reporter | |
| Tags: | 32 exe Loki |
Intelligence
File Origin
# of uploads :
1
# of downloads :
194
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
1e7c6b3a5cbc9bca9af96ac238da074c
Verdict:
Malicious activity
Analysis date:
2022-01-31 05:30:09 UTC
Tags:
trojan lokibot stealer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Loki
Result
Verdict:
Malware
Maliciousness:
Behaviour
Reading critical registry keys
Changing a file
Creating a file in the %AppData% subdirectories
DNS request
Enabling the 'hidden' option for analyzed file
Сreating synchronization primitives
Stealing user critical data
Query of malicious DNS domain
Moving of the original file
Sending an HTTP POST request to an infection source
Result
Malware family:
n/a
Score:
9/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
CPUID_Instruction
SystemUptime
CheckCmdLine
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Loki
Verdict:
Malicious
Result
Threat name:
Lokibot
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Detection:
lokibot
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2022-01-31 05:28:13 UTC
File Type:
PE (Exe)
Extracted files:
30
AV detection:
23 of 28 (82.14%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
lokipasswordstealer(pws)
Similar samples:
+ 7'824 additional samples on MalwareBazaar
Result
Malware family:
lokibot
Score:
10/10
Tags:
family:lokibot collection spyware stealer trojan
Behaviour
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
outlook_office_path
outlook_win_path
Accesses Microsoft Outlook profiles
Reads user/profile data of web browsers
Lokibot
Malware Config
C2 Extraction:
http://secure01-redirect.net/gc14/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files
SH256 hash:
7bf027041e171385e3945f8f56a0bd09fce737aeadc63b82830d51fc3a378a33
MD5 hash:
5a79f3cd5d4f9bf7bc0652bdf464f3c2
SHA1 hash:
45aa42ad610bdaeab9825ade33f70ecc96235307
Detections:
win_lokipws_g0
win_lokipws_auto
Parent samples :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 hash:
ca2a87b0664849a8f35d69cabebb190ca348c84db69196c9a3da45952bc16905
MD5 hash:
1e7c6b3a5cbc9bca9af96ac238da074c
SHA1 hash:
5bd24027dd1ac9ab9ea786bdf02cc157661dbb76
Malware family:
Lokibot
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://103.89.90.10/Registry/.win32.exe