MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f482fea1f48a2c590f2b554dd2bf961234ccff52cc60bac18cbaa84457183afc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: f482fea1f48a2c590f2b554dd2bf961234ccff52cc60bac18cbaa84457183afc
SHA3-384 hash: c44d683af18f94d606b8192a7aba08e591740d00ea8fee3be9783929d345777f5472505a0a8f5e7aea1269177206bc39
SHA1 hash: 9e9292ee75fd35a098619461430b1492f4aec52b
MD5 hash: 50b57b84d880c8181a67fec0bbd0c5aa
humanhash: carpet-stream-mango-georgia
File name:INVOICE_NO_SFFPL22_23186_pdf.exe
Download: download sample
Signature Loki
File size:739'840 bytes
First seen:2023-01-23 09:08:52 UTC
Last seen:2023-01-30 09:03:58 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'602 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:2yzaxCiF3/KJYOu2DhpV4DHfPr6s3ELF3sgouVnJV4ilzP:2yzaYi5KJbu2DDVYXJ3E9sL4z4OP
Threatray 15'279 similar samples on MalwareBazaar
TLSH T1D3F46A112191C2D5ECF54E780678F92427959E5BE32D41AEBEC7343A88F378B84787A3
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter adrian__luca
Tags:exe Loki

Intelligence


File Origin
# of uploads :
2
# of downloads :
184
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
lokibot
ID:
1
File name:
INVOICE_NO_SFFPL22_23186_pdf.exe
Verdict:
Malicious activity
Analysis date:
2023-01-23 09:09:48 UTC
Tags:
trojan lokibot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Sending a custom TCP request
DNS request
Unauthorized injection to a recently created process
Creating a file
Enabling the 'hidden' option for analyzed file
Moving of the original file
Verdict:
No Threat
Threat level:
  2/10
Confidence:
75%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Lokibot
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected AntiVM3
Yara detected aPLib compressed binary
Yara detected Lokibot
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2023-01-20 07:41:13 UTC
File Type:
PE (.Net Exe)
Extracted files:
12
AV detection:
26 of 37 (70.27%)
Threat level:
  5/5
Result
Malware family:
lokibot
Score:
  10/10
Tags:
family:lokibot collection spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Reads user/profile data of web browsers
Lokibot
Malware Config
C2 Extraction:
http://171.22.30.147/gk1/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Unpacked files
SH256 hash:
9f75bfb67da98cefeb325bf89be2ebf0b235dabbe8617d9e23e117e03e4cf07e
MD5 hash:
babf1779f37d62b3f1b56622cd680ec2
SHA1 hash:
f340b46cf13975e4a083a621336d3ccf630e66f2
SH256 hash:
072bafe83d2a9c1e68c1675f13b8e5eb061b8033353a7555a6aa41fcf5dea886
MD5 hash:
6eae82e70a2e35e07f10c31e9328ebc5
SHA1 hash:
91c3942853029ebcbc56101d7550c8b7c6b35ac1
Detections:
lokibot win_lokipws_auto win_lokipws_g0
Parent samples :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 hash:
f8300fe0112621a9eaf204d22d855ba8aba6b11b12efa53449bd49b340331987
MD5 hash:
d16696308c92ac26f68a5c7f005b4e3c
SHA1 hash:
8777a497cbee9c5de10c102032c11beb1b2fa7f8
SH256 hash:
ab2f8dbc2b147528cecac6ea1a8886951c424be0b2026743b39d97f0cbabb04c
MD5 hash:
77ab42f4bbbf4565846eb8953192d71f
SHA1 hash:
3c662c756cc31867c0473716a74e777a65ced550
SH256 hash:
4ebfa5b147bd5458384ca7e6a1dab7cb539cad5e03a46c3f3dda831b47819108
MD5 hash:
c0e407a3fae9e34d7af7025912573a6e
SHA1 hash:
3a321ad84aaa583939a0c97d9d85645c7cc5d161
SH256 hash:
f482fea1f48a2c590f2b554dd2bf961234ccff52cc60bac18cbaa84457183afc
MD5 hash:
50b57b84d880c8181a67fec0bbd0c5aa
SHA1 hash:
9e9292ee75fd35a098619461430b1492f4aec52b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

Executable exe f482fea1f48a2c590f2b554dd2bf961234ccff52cc60bac18cbaa84457183afc

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments