MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f30fd3eac2f68db757aa698a3438c007c52e7959a92d16015289621e5c538d4f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 16
| SHA256 hash: | f30fd3eac2f68db757aa698a3438c007c52e7959a92d16015289621e5c538d4f |
|---|---|
| SHA3-384 hash: | 7e90bb1cb05cdec767bb18bec50c7ae59815daac373767b6aedb64cdf4c1f1b9ed366f03a6b872f200336769496d0abb |
| SHA1 hash: | 1346563ce0d08cdaee55a092acaefc689decc502 |
| MD5 hash: | 2c6e9861fc483031c22e3bb661f130bd |
| humanhash: | snake-stream-hamper-jig |
| File name: | RFQ-344-019864.exe |
| Download: | download sample |
| Signature | Loki |
| File size: | 847'872 bytes |
| First seen: | 2022-08-22 02:25:06 UTC |
| Last seen: | 2022-08-22 02:33:35 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'650 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger) |
| ssdeep | 12288:OfEWcBeIgl/1zWtatRE1ntPdNx3ZEsOQH+Pvun1W2oS:OEvBpgl/8EtUn57x3ysOQkmo2 |
| Threatray | 9'249 similar samples on MalwareBazaar |
| TLSH | T17F05AF9CABA6C455DC2D4278E0A655F41622EC15F62AEE8FB5C7FEE93E323BD4041103 |
| TrID | 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.4% (.EXE) Win64 Executable (generic) (10523/12/4) 6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.4% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.EXE) OS/2 Executable (generic) (2029/13) |
| File icon (PE): | |
| dhash icon | 4d4d4dc4c0507495 (7 x Loki, 6 x AgentTesla, 5 x Formbook) |
| Reporter | |
| Tags: | exe Loki |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://162.213.249.190/?qbcCI493GtTnmNfb9Ab9k3YwTRqKkHYKSanBexEU1yinmxyw7KFs | https://threatfox.abuse.ch/ioc/844460/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | BitcoinAddress |
|---|---|
| Author: | Didier Stevens (@DidierStevens) |
| Description: | Contains a valid Bitcoin address |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.