MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d43cd307bf48505b33150202c0e787fcf79af09be0389558f5461d2a2ef64f2b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 8
| SHA256 hash: | d43cd307bf48505b33150202c0e787fcf79af09be0389558f5461d2a2ef64f2b |
|---|---|
| SHA3-384 hash: | 82a81a9ed74743f72fdc34a225ae8008e96de2d914940c627288723c69dfcdc56fb812fa8d825108b440063614bca342 |
| SHA1 hash: | 59a89092ab039ce6968c5855fdcd76dcefbd4e8f |
| MD5 hash: | eb9158b121ed38379a2c6e3e91c21929 |
| humanhash: | saturn-lion-beer-east |
| File name: | eb9158b121ed38379a2c6e3e91c21929 |
| Download: | download sample |
| Signature | Loki |
| File size: | 264'047 bytes |
| First seen: | 2021-09-28 09:02:44 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | b76363e9cb88bf9390860da8e50999d2 (464 x Formbook, 184 x AgentTesla, 122 x SnakeKeylogger) |
| ssdeep | 6144:l8LxBjEln87x7roi0Smawia7Hy9k5dA14tTvIx0yd8Hs6ZCh:0S8N/oi0SByyiS18LIx0ydhh |
| Threatray | 4'809 similar samples on MalwareBazaar |
| TLSH | T136441222A1C2C5FFFBD296B095357AB6F27A9F86050512578FE41F373074A06D80BB86 |
| Reporter | |
| Tags: | 32 exe Loki |
Intelligence
File Origin
# of uploads :
1
# of downloads :
79
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SOA Swift.xlsx
Verdict:
Malicious activity
Analysis date:
2021-09-22 05:50:30 UTC
Tags:
encrypted opendir exploit CVE-2017-11882 loader
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Creating a file
Unauthorized injection to a recently created process
Creating a window
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Lokibot
Detection:
malicious
Classification:
troj.spyw.evad
Score:
96 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected aPLib compressed binary
Yara detected Lokibot
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.LokiBot
Status:
Malicious
First seen:
2021-09-22 07:01:09 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
5/5
Verdict:
malicious
Label(s):
lokipasswordstealer(pws)
Similar samples:
+ 4'799 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
7/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Loads dropped DLL
Unpacked files
SH256 hash:
73d3ff56d25b5e38b3797d9a0a9a38e7562482643d98e98fad3859b7131e38e4
MD5 hash:
697d6a656689a4149a5f0dcb38147570
SHA1 hash:
ed37ba2df07f4e58e065eea1249542f3d2fccdc6
Detections:
win_lokipws_g0
win_lokipws_auto
SH256 hash:
064bbb4d379049514f80f1c6e1ab89c54385f54b88af700be8b85888aec9a011
MD5 hash:
cacf978c6a8ed4c857e4095353de16f9
SHA1 hash:
7d5d24740d5fe3553fc89bef9e79bbd52742c575
SH256 hash:
d43cd307bf48505b33150202c0e787fcf79af09be0389558f5461d2a2ef64f2b
MD5 hash:
eb9158b121ed38379a2c6e3e91c21929
SHA1 hash:
59a89092ab039ce6968c5855fdcd76dcefbd4e8f
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.37
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://107.172.93.32/wins/vbc.exe