Overview

Description

Loki performs detections for the presence of potentially malicious executions using four detection methods:

  1. File Name IOC
    Regex match on full file path/name

  2. Yara Rule Check
    Yara signature match on file data and process memory

  3. Hash Check
    Compares known malicious hashes (MD5, SHA1, SHA256) with scanned files

  4. C2 Back Connect Check
    Compares process connection endpoints with C2 IOCs (new since version v.10)

Usage

Basic usage: python /path/to/loki.py