MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f6f4af26411c4fc26ba80d6fc8a9f284590829644c53f6eabb3395a5cdb3c0ee. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 4


Intelligence 4 IOCs YARA 4 File information Comments

SHA256 hash: f6f4af26411c4fc26ba80d6fc8a9f284590829644c53f6eabb3395a5cdb3c0ee
SHA3-384 hash: 46cd0860bfa5d4e3370b139a9f85de4f7e4dbc0b7b482c79b074a2954e7d9bd1ce0339480ba5e46c3e5d70fb0e08795a
SHA1 hash: 91e4adfd83dd6ae5db62656f1246626642bbfcc0
MD5 hash: af365d9dc9fec4e615c474867469323e
humanhash: hawaii-queen-carbon-uranus
File name:a559502f13fe48940c7f3bb3b32cfde7.decoded
Download: download sample
Signature Loki
File size:106'496 bytes
First seen:2020-03-26 13:41:53 UTC
Last seen:2020-04-08 17:13:25 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 0239fd611af3d0e9b0c46c5837c80e09 (251 x Loki, 1 x Heodo)
ssdeep 1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG
Threatray 1'463 similar samples on MalwareBazaar
TLSH 57A31942B2A5C030F7B74DB2BB73A5B7857E7C332D22C84E9352459A14215E1EB7AB13
Reporter abuse_ch
Tags:exe GuLoader Loki


Avatar
abuse_ch
Payload dropped by GuLoader from the following URL:
http://castmart.ga/~zadmin/ecloud/freg_encrypted_AB25A8F.bin

Intelligence


File Origin
# of uploads :
4
# of downloads :
84
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Fareit
Status:
Malicious
First seen:
2020-03-26 13:48:31 UTC
AV detection:
30 of 31 (96.77%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Lokibot
Author:JPCERT/CC Incident Response Group
Description:detect Lokibot in memory
Reference:internal research
Rule name:win_lokipws_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_lokipws_g0
Author:Slavo Greminger, SWITCH-CERT
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

745ed8bd5e4cf36354175563397a890d79ae0bd3795b1ba25cb19e6f1e984b48

Loki

Executable exe f6f4af26411c4fc26ba80d6fc8a9f284590829644c53f6eabb3395a5cdb3c0ee

(this sample)

  
Dropped by
MD5 a559502f13fe48940c7f3bb3b32cfde7
  
Dropped by
MD5 146614e1a694e7a8f3d4036624a5c2dd
  
Dropped by
GuLoader
  
Dropped by
SHA256 745ed8bd5e4cf36354175563397a890d79ae0bd3795b1ba25cb19e6f1e984b48
  
Dropped by
SHA256 76622d0e78ad427abea56a3c48b799a2f48a3c0c2a5d8a141d10efb09c8fc23c

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
WIN_SOCK_APIUses Network to send and receive dataWS2_32.dll::freeaddrinfo
WS2_32.dll::getaddrinfo

Comments