MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d6292961e8b6d4a4cec4a894272ddb600ffa618542d654500315eec38a1c1bdc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: d6292961e8b6d4a4cec4a894272ddb600ffa618542d654500315eec38a1c1bdc
SHA3-384 hash: ef3b172bb01059cdd34188e04ad9919c2e2f37572cfb05b5e23b83870437bf20123f856030112c3a6fd5ab681e1b1897
SHA1 hash: ff64b03710f886336f5ff82a2a0f0cf436304ae1
MD5 hash: eb9b65697f1fb8d309b3e5a375fbcdfd
humanhash: network-may-maine-jig
File name:pdfInv. 12214909.zip
Download: download sample
Signature Loki
File size:479'241 bytes
First seen:2022-11-10 08:58:12 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:Tffo/OjZndlnziBkpdhKMj71wCvliUV6N5B/bASW0L:T3oGJnnzmM313/W/cML
TLSH T1ABA4233F45722124712B56F4AEB9EE1478362EDD7C20C57510B9E25FDD0AC81E81FACA
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter cocaman
Tags:Loki zip


Avatar
cocaman
Malicious email (T1566.001)
From: "Glencore International AG <info@glencore.com>" (likely spoofed)
Received: "from hp0.wx16.vmxa.live (unknown [147.182.237.134]) "
Date: "10 Nov 2022 09:00:51 +0100"
Subject: "FWD:Documentation for delivery note 38463 // Inv. 12214909"
Attachment: "pdfInv. 12214909.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
116
Origin country :
n/a
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:pdfInv. 12214909.exe
File size:812'032 bytes
SHA256 hash: 8535c5c4617a048a3e8505769fdd5f186669fd38f9ac0ade22add7fa1028f382
MD5 hash: 9dd1ebc36b29f0e507bcee46c5e3baa1
MIME type:application/x-dosexec
Signature Loki
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed rundll32.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Backdoor.Androm
Status:
Malicious
First seen:
2022-11-10 08:59:08 UTC
File Type:
Binary (Archive)
Extracted files:
64
AV detection:
8 of 40 (20.00%)
Threat level:
  5/5
Result
Malware family:
lokibot
Score:
  10/10
Tags:
family:lokibot collection evasion spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Maps connected drives based on registry
Checks BIOS information in registry
Checks computer location settings
Reads user/profile data of web browsers
Looks for VMWare Tools registry key
Looks for VirtualBox Guest Additions in registry
Lokibot
Malware Config
C2 Extraction:
http://sempersim.su/gl25/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

zip d6292961e8b6d4a4cec4a894272ddb600ffa618542d654500315eec38a1c1bdc

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Loki

Comments