MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e90afb5e8db6f087a07263fa3814f1ce4b82472418331b910884a5ae7d27d467. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 4


Intelligence 4 IOCs YARA 3 File information Comments

SHA256 hash: e90afb5e8db6f087a07263fa3814f1ce4b82472418331b910884a5ae7d27d467
SHA3-384 hash: 2b6bd5a8f62771885141b459fde88cea542d9cac4e9e077430edc0bba9f7525d432cc6e489459a161e85b938c7723278
SHA1 hash: 1d53f8c2d71137a891620a778c9cfe6bd2b1d97e
MD5 hash: 79913a41b0aa377d2e31ef8ed0ce94e8
humanhash: artist-hamper-asparagus-jupiter
File name:frega.exe
Download: download sample
Signature Loki
File size:279'635 bytes
First seen:2020-06-29 07:37:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7c2c71dfce9a27650634dc8b1ca03bf0 (160 x Loki, 58 x Formbook, 55 x Adware.Generic)
ssdeep 6144:XPCganNBbpUhxMMUTOcLAJsaPdKFNCkBNq1F70VA4adn92cVP/go:tanHb+MMwOcLw3dKFNC0Y1FvPdn7PB
Threatray 715 similar samples on MalwareBazaar
TLSH 3954122A73B0DDE3DA540A702E724D771BF756950184AB4383802E9DAF6B9D3812F693
Reporter abuse_ch
Tags:COVID-19 exe Loki


Avatar
abuse_ch
Malspam distributing Loki:

HELO: ecs-b68dM.localdomain
Sending IP: 102.38.254.72
From: Majid Jami <majid.jami@parsbehdasht.com>
Subject: COVID-19-Order-june-29-06-20-Quote
Attachment: INV20202906PO195.img (contains "frega.exe")

Loki C2:
http://egamcorps.ga/~zadmin/lmark/frega/mode.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Swotter
Status:
Malicious
First seen:
2020-06-29 07:39:06 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
persistence
Behaviour
Modifies service
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Lokibot
Author:JPCERT/CC Incident Response Group
Description:detect Lokibot in memory
Reference:internal research
Rule name:win_lokipws_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

Executable exe e90afb5e8db6f087a07263fa3814f1ce4b82472418331b910884a5ae7d27d467

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments