MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fa905ffdb00ec8867a003c49ebfa43f6ff96b890c40b3fe31b0fc40bb344ded0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: fa905ffdb00ec8867a003c49ebfa43f6ff96b890c40b3fe31b0fc40bb344ded0
SHA3-384 hash: c25815f36e92c4425ac5768232cbcf3762049663241ca56a94e7b28fd7ecba350064dd6f519a163897aa781c0e8084c1
SHA1 hash: ad0eaa7865664422964cea62b107b64d578f1725
MD5 hash: 980722f5196ad004a168d6a4a1c3d244
humanhash: east-papa-gee-carpet
File name:ID547-MSC-202041789(BL DRAFT).gz.exe
Download: download sample
Signature Loki
File size:217'088 bytes
First seen:2020-04-24 04:47:46 UTC
Last seen:2020-04-24 06:08:19 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 467b843b3a7f52c9591a01633eacee05 (1 x Loki, 1 x GuLoader)
ssdeep 1536:o/cOdHKipZnW4zPyd8YDj9S0s8SLcgrtl7gM8/Rb0FrBxmH0MUr:TgH/p6yYdvjSn/kH/Rql60Mq
Threatray 1'612 similar samples on MalwareBazaar
TLSH B1240842ACB49963C71446315FEAE7BEC35CBDC0D9D5CA4F2080771BAF33296266252E
Reporter cocaman
Tags:exe Loki

Intelligence


File Origin
# of uploads :
3
# of downloads :
97
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-04-24 07:36:00 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
23 of 31 (74.19%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

Executable exe fa905ffdb00ec8867a003c49ebfa43f6ff96b890c40b3fe31b0fc40bb344ded0

(this sample)

  
Delivery method
Other

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
VB_APILegacy Visual Basic API usedMSVBVM60.DLL::EVENT_SINK_AddRef

Comments