MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e8d4cd03450bee6fa32028e4e4e0e415d4c4bbfcb349e77170cd983226666820. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 21


Intelligence 21 IOCs YARA 5 File information Comments

SHA256 hash: e8d4cd03450bee6fa32028e4e4e0e415d4c4bbfcb349e77170cd983226666820
SHA3-384 hash: 53bdbee8a44df8796b2fc78e1a2c7bb5da2e108f12affe3f18fc252df6285eac271ed1f341923040026f7f0f41b94d3a
SHA1 hash: 837466f8ed5ca9bcbe32f3a47ca22b78edc575ea
MD5 hash: b50b4d0571d969c260c4fc62c5d7a521
humanhash: eleven-robert-eight-carbon
File name:e8d4cd03450bee6fa32028e4e4e0e415d4c4bbfcb349e77170cd983226666820
Download: download sample
Signature Loki
File size:701'298 bytes
First seen:2025-10-02 11:29:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e92b2275a730f59940462780c383a1b0 (26 x CryptOne, 3 x Loki, 2 x Mimic)
ssdeep 12288:yqUyZzjn9co0dEg0uR8SQkPjBvL8omzSN1:tdZKo0o88SrBVZf
Threatray 182 similar samples on MalwareBazaar
TLSH T113E4BF91F281E8F4E436043945B9E634191BAF2CB9B4497F25A9251D26B338360FBF4F
TrID 91.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.6% (.EXE) Win64 Executable (generic) (10522/11/4)
1.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4504/4/1)
0.6% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter JAMESWT_WT
Tags:exe Loki PO109228

Intelligence


File Origin
# of uploads :
1
# of downloads :
289
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
lokibot
ID:
1
File name:
Ordine di acquisto_(PO_109228)_doc.exe
Verdict:
Malicious activity
Analysis date:
2025-10-02 11:28:14 UTC
Tags:
lokibot stealer evasion trojan telegram exfiltration agenttesla qrcode ims-api generic

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
81.4%
Tags:
injection obfusc sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file
Launching a process
Creating a process from a recently created file
Reading critical registry keys
Launching a service
Changing a file
DNS request
Connection attempt
Sending an HTTP POST request
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Unauthorized injection to a recently created process
Forced shutdown of a system process
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
fingerprint lokibot microsoft_visual_cc obfuscated overlay packed packer_detected
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-10-01T07:27:00Z UTC
Last seen:
2025-10-04T04:57:00Z UTC
Hits:
~1000
Gathering data
Threat name:
Win32.Infostealer.LokiBot
Status:
Malicious
First seen:
2025-10-01 17:02:19 UTC
File Type:
PE (Exe)
Extracted files:
76
AV detection:
29 of 38 (76.32%)
Threat level:
  5/5
Result
Malware family:
lokibot
Score:
  10/10
Tags:
family:lokibot adware collection discovery spyware stealer trojan
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
ConfuserEx .NET packer
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Checks computer location settings
Executes dropped EXE
Lokibot
Lokibot family
Malware Config
C2 Extraction:
http://montblancgroup.cfd/New/PWS/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Verdict:
Malicious
Tags:
Win.Trojan.Hzzv-7433640-0 lokibot
YARA:
n/a
Unpacked files
SH256 hash:
e8d4cd03450bee6fa32028e4e4e0e415d4c4bbfcb349e77170cd983226666820
MD5 hash:
b50b4d0571d969c260c4fc62c5d7a521
SHA1 hash:
837466f8ed5ca9bcbe32f3a47ca22b78edc575ea
SH256 hash:
5aa774e9545c8b8ce704219aeb374be885ec8533eaa8562db4ad5118917582be
MD5 hash:
bfd948b8b91e56b10c2aab1f9f11358a
SHA1 hash:
65049106999cc5351c73c3a738f40417f7bc8fd0
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
f19c0ac892bc18f53706ce5a5d9fbb09c7eee837e0590b550e8b6588a3a6db66
MD5 hash:
3e1522d238b2ed6e1e1e6a210dd9b676
SHA1 hash:
0fe2d8b9c0560f313778e881cbf901146c5beb3c
SH256 hash:
47e2bd28e93c047783c899c3f76765ddb263b3062f50a55c11d32fc354b15c6b
MD5 hash:
35ab576d4acd0143eb46496dff6b5510
SHA1 hash:
b766154ec0ac6f8b1b23615954237be6b5cc4284
Detections:
win_lokipws_g0 win_lokipws_auto lokibot STEALER_Lokibot SUSP_XORed_URL_In_EXE Lokibot INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients INDICATOR_SUSPICIOUS_GENInfoStealer
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments