MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 effac7ab31752c5670c42d428daab6aa31ba4c63071687083b45eaf30ae86a15. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 13
| SHA256 hash: | effac7ab31752c5670c42d428daab6aa31ba4c63071687083b45eaf30ae86a15 |
|---|---|
| SHA3-384 hash: | f4a414ad5056191b95fd9944e9aa3e356559a03ff9df06ccfa1de57c7d5caa276ad2552e3bcabd25b0dc1568e1b9653c |
| SHA1 hash: | 94634aa4d84b2826b8cec629d1d7452f94deaffe |
| MD5 hash: | c7d896de3fb53bc3d4337e6185b7f65a |
| humanhash: | five-timing-edward-wyoming |
| File name: | 4060.xlsx |
| Download: | download sample |
| Signature | Loki |
| File size: | 191'496 bytes |
| First seen: | 2022-01-31 07:27:12 UTC |
| Last seen: | 2022-02-01 10:24:47 UTC |
| File type: | |
| MIME type: | application/encrypted |
| ssdeep | 3072:xvuTdsz3nYrU1ibGxzxYglQ7ZP/VT3wT8RhIZkv+tDb5xh6dwQwGXD9VzYT/D4uL:hMGzEUYzglM/F3wTQWkvK3pk7ztA |
| TLSH | T15A1402AFFBAB405ADFA22637149B4C749F2FEE97A42537D07D80FE10D934141302A969 |
| Reporter | |
| Tags: | CVE-2017-11882 Loki VelvetSweatshop xlsx |
Office OLE Information
This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.
OLE dump
| Detection: VelvetSweatshop |
MalwareBazaar was able to identify 6 sections in this file using oledump:
| Section ID | Section size | Section name |
|---|---|---|
| 1 | 64 bytes | DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace |
| 2 | 112 bytes | DataSpaces/DataSpaceMap |
| 3 | 208 bytes | DataSpaces/TransformInfo/StrongEncryptionTransform/Primary |
| 4 | 76 bytes | DataSpaces/Version |
| 5 | 184840 bytes | EncryptedPackage |
| 6 | 224 bytes | EncryptionInfo |
Intelligence
File Origin
# of uploads :
2
# of downloads :
195
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
4060.xlsx
Verdict:
Malicious activity
Analysis date:
2022-01-31 09:11:10 UTC
Tags:
encrypted opendir exploit CVE-2017-11882 loader trojan lokibot stealer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Suspicious
Maliciousness:
Behaviour
DNS request
Creating a window
Сreating synchronization primitives
Searching for the window
Searching for synchronization primitives
Launching a process
Unauthorized injection to a recently created process
Result
Verdict:
Malicious
File Type:
OOXML Excel File with Embedding Objects in Encrypted Excel File
Document image
Image:
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
control.exe embedequation exploit shell32.dll shellcode VelvetSweatshop
Label:
Malicious
Suspicious Score:
9.8/10
Score Malicious:
99%
Score Benign:
1%
Result
Verdict:
MALICIOUS
Link:
Details
Macro Execution Coercion
Detected a document that appears to social engineer the user into activating embedded logic.
Document With No Content
Document contains little or no semantic information.
Result
Threat name:
Lokibot
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Detection:
lokibot
Threat name:
Document-Office.Exploit.CVE-2017-11882
Status:
Malicious
First seen:
2022-01-31 03:17:42 UTC
File Type:
Document
Extracted files:
51
AV detection:
18 of 43 (41.86%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
lokibot
Score:
10/10
Tags:
family:lokibot collection spyware stealer trojan
Behaviour
Checks processor information in registry
Enumerates system info in registry
Launches Equation Editor
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
NSIS installer
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Loads dropped DLL
Reads user/profile data of web browsers
Uses the VBS compiler for execution
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
Lokibot
Malware Config
C2 Extraction:
http://secure01-redirect.net/gc19/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Lokibot
Score:
0.90
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.