MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d11c5921aad261c2d8b4eeb98aa56204714497ce7b62230ed610a1bda0c1309a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 13


Maldoc score: 2


Intelligence 13 IOCs YARA 4 File information Comments

SHA256 hash: d11c5921aad261c2d8b4eeb98aa56204714497ce7b62230ed610a1bda0c1309a
SHA3-384 hash: 6b47c3b57b72acb98f1c1add62e87639678d36ddd3347ef72276b7b115b11cb2f607b2b9a12d138eb7e62b7ce2b86624
SHA1 hash: 61df8b542ba1f0e413317fa4fba9bf2220731b15
MD5 hash: 48f1a27303c4fdb921e068b5f0354737
humanhash: jupiter-king-hamper-bakerloo
File name:payment proof.xls
Download: download sample
Signature Loki
File size:1'371'136 bytes
First seen:2023-10-02 15:29:27 UTC
Last seen:Never
File type:Excel file xls
MIME type:application/vnd.ms-excel
ssdeep 24576:2WQmmav30xQBFZyww6VDAXZS8WZyzw6VeAXZSyw+QQbWMvT4p6BzArOCfTweNGY:rQmmQ304E6VAE5H6V1ECWsT7GOCrlAY
TLSH T12F55D00B94149B8AC00C83F86E1339990F0F7F15A7D569DB14677B8B3E31AA21DCA6DD
TrID 46.5% (.XLS) Microsoft Excel sheet (alternate) (56500/1/4)
26.7% (.XLS) Microsoft Excel sheet (32500/1/3)
20.1% (.XLS) Microsoft Excel sheet (alternate) (24500/1/2)
6.5% (.) Generic OLE2 / Multistream Compound (8000/1)
Reporter abuse_ch
Tags:CVE-2017-11882 CVE-2018-0802 Loki xls

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 2
OLE dump

MalwareBazaar was able to identify 39 sections in this file using oledump:

Section IDSection sizeSection name
1114 bytesCompObj
2244 bytesDocumentSummaryInformation
3120908 bytesSummaryInformation
494 bytesMBD0003708E/CompObj
562 bytesMBD0003708E/Ole
620409 bytesMBD0003708E/CONTENTS
794 bytesMBD0003708F/CompObj
862 bytesMBD0003708F/Ole
9141190 bytesMBD0003708F/CONTENTS
1094 bytesMBD00037090/CompObj
1162 bytesMBD00037090/Ole
127284 bytesMBD00037090/CONTENTS
1393 bytesMBD00037091/CompObj
1464 bytesMBD00037091/Ole
15124841 bytesMBD00037091/CONTENTS
1693 bytesMBD00037092/CompObj
1764 bytesMBD00037092/Ole
1866661 bytesMBD00037092/CONTENTS
1999 bytesMBD00037093/CompObj
2091440 bytesMBD00037093/Package
2193 bytesMBD00037094/CompObj
2264 bytesMBD00037094/Ole
23124841 bytesMBD00037094/CONTENTS
2493 bytesMBD00037095/CompObj
2564 bytesMBD00037095/Ole
2666661 bytesMBD00037095/CONTENTS
2799 bytesMBD00037096/CompObj
2891441 bytesMBD00037096/Package
2920 bytesMBD00037097/Ole
301676 bytesMBD00037097/Ole10NatIVe
31481450 bytesWorkbook
32527 bytes_VBA_PROJECT_CUR/PROJECT
33104 bytes_VBA_PROJECT_CUR/PROJECTwm
34977 bytes_VBA_PROJECT_CUR/VBA/Sheet1
35977 bytes_VBA_PROJECT_CUR/VBA/Sheet2
36977 bytes_VBA_PROJECT_CUR/VBA/Sheet3
37985 bytes_VBA_PROJECT_CUR/VBA/ThisWorkbook
382644 bytes_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
39553 bytes_VBA_PROJECT_CUR/VBA/dir
OLE vba

MalwareBazaar was able to extract and deobfuscate VBA script(s) the following information from OLE objects embedded in this file using olevba:

TypeKeywordDescription
SuspiciousHex StringsHex-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)

Intelligence


File Origin
# of uploads :
1
# of downloads :
319
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Searching for synchronization primitives
Launching a process
Creating a file in the %AppData% directory
Сreating synchronization primitives
Sending an HTTP GET request
Creating a process from a recently created file
Result
Verdict:
Malicious
File Type:
Legacy Excel File with Macro
Behaviour
BlacklistAPI detected
Document image
Document image
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
embedequation exploit exploit greyware macros packed shellcode sload
Label:
Benign
Suspicious Score:
4.7/10
Score Malicious:
47%
Score Benign:
53%
Result
Threat name:
Lokibot
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Excel sheet contains many unusual embedded objects
Found malware configuration
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Office equation editor drops PE file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Shellcode detected
Sigma detected: File Dropped By EQNEDT32EXE
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected aPLib compressed binary
Yara detected Lokibot
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1318041 Sample: payment_proof.xls Startdate: 02/10/2023 Architecture: WINDOWS Score: 100 40 Snort IDS alert for network traffic 2->40 42 Multi AV Scanner detection for domain / URL 2->42 44 Found malware configuration 2->44 46 15 other signatures 2->46 6 EQNEDT32.EXE 12 2->6         started        11 EQNEDT32.EXE 11 2->11         started        13 AcroRd32.exe 33 2->13         started        15 EXCEL.EXE 58 70 2->15         started        process3 dnsIp4 38 46.183.223.121, 49162, 80 DATACLUBLV Latvia 6->38 28 C:\Users\user\AppData\Roaming\audiodg.exe, PE32 6->28 dropped 30 C:\Users\user\AppData\Local\...\loki[1].exe, PE32 6->30 dropped 56 Office equation editor establishes network connection 6->56 58 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 6->58 17 audiodg.exe 54 6->17         started        22 audiodg.exe 11->22         started        24 RdrCEF.exe 2 13->24         started        file5 signatures6 process7 dnsIp8 32 sempersim.su 104.237.252.65, 49164, 49165, 49166 DEDICATED-FIBER-COMMUNICATIONSUS United States 17->32 26 C:\Users\user\AppData\...\5879F5.exe (copy), PE32 17->26 dropped 48 Multi AV Scanner detection for dropped file 17->48 50 Detected unpacking (changes PE section rights) 17->50 52 Detected unpacking (overwrites its own PE header) 17->52 54 6 other signatures 17->54 34 192.168.2.22, 137, 138, 49162 unknown unknown 24->34 36 192.168.2.255, 137, 138 unknown unknown 24->36 file9 signatures10
Threat name:
Win32.Exploit.CVE-2018-0802
Status:
Malicious
First seen:
2023-10-02 00:06:46 UTC
File Type:
Document
Extracted files:
142
AV detection:
9 of 35 (25.71%)
Threat level:
  5/5
Result
Malware family:
lokibot
Score:
  10/10
Tags:
family:lokibot collection spyware stealer trojan
Behaviour
Checks processor information in registry
Enumerates system info in registry
Launches Equation Editor
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy WMI provider
Uses Volume Shadow Copy service COM API
outlook_office_path
outlook_win_path
Accesses Microsoft Outlook profiles
Reads user/profile data of web browsers
Executes dropped EXE
Loads dropped DLL
Blocklisted process makes network request
Downloads MZ/PE file
Lokibot
Malware Config
C2 Extraction:
https://sempersim.su/a14/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_OLE_EXPLOIT_CVE_2017_11882_1
Author:ditekSHen
Description:detects OLE documents potentially exploiting CVE-2017-11882
Rule name:informational_win_ole_protected
Author:Jeff White (karttoon@gmail.com) @noottrak
Description:Identify OLE Project protection within documents.
Rule name:maldoc_OLE_file_magic_number
Author:Didier Stevens (https://DidierStevens.com)
Rule name:office_document_vba
Author:Jean-Philippe Teissier / @Jipe_
Description:Office document with embedded VBA
Reference:https://github.com/jipegit/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

Excel file xls d11c5921aad261c2d8b4eeb98aa56204714497ce7b62230ed610a1bda0c1309a

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments