LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection. It is based on four detection methods: 1. File Name IOC: Regex match on full file path/name. 2. Yara Rule Check: Yara signature match on file data and process memory. 3. Hash Check: Compares known malicious hashes (MD5, SHA1, SHA256) with scanned files. 4. C2 Back Connect Check: Compares process connection endpoints with C2 IOCs.
Common questions about LOKI including features, pricing, alternatives, and user reviews.
LOKI is LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection. It is a Security Operations solution designed to help security teams with IOC, YARA.
Expands a single malware hash into full family visibility via structural analysis.
YARA signature and IOC database for LOKI and THOR Lite scanners with high quality rules and IOCs.
FireEye Mandiant SunBurst Countermeasures: freely available rules for detecting malicious files and activity