MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1e768e1570483ce3c47ac83ee64e70f37aca8a71e2db2a896ec8d313d8093ff8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 2


Intelligence 2 IOCs YARA File information Comments

SHA256 hash: 1e768e1570483ce3c47ac83ee64e70f37aca8a71e2db2a896ec8d313d8093ff8
SHA3-384 hash: 6857a8abe70956f51603a0baf768abc2dcbc47c1eb0a3122695ac2a010c606432fdee3421ea76c612a5aa29b3694f9a6
SHA1 hash: 917e5ed226ce13449435c847bf17ac82f438ca03
MD5 hash: d8453147f83bcef216cb116e0c4de716
humanhash: berlin-india-speaker-kentucky
File name:Bank Details_pdf.gz
Download: download sample
Signature Loki
File size:380'071 bytes
First seen:2020-05-27 11:37:53 UTC
Last seen:Never
File type: gz
MIME type:application/gzip
ssdeep 6144:+ZJdw2v3ckdM/2QfnEmbd6MFRqIfZMTqTXItEcIoKndQucucY0vDXun:92v3cEM/2CEmB6MSIxPXI2cIoKnd+Y6q
TLSH 2E8423BE853474BEDFFB481094F80117278ADF1DDFA994B155999ECEB18B82C2C82934
Reporter abuse_ch
Tags:gz Loki


Avatar
abuse_ch
Malspam distributing Loki:

HELO: staging.maykenbel.com
Sending IP: 195.12.49.182
From: Rafał Gąsior <rafal.gasior@astoria.pl>
Subject: RE: URGENT-Confirm Account Details/SOA Feb-May
Attachment: Bank Details_pdf.gz (contains "Bank Details_pdf.exe")

Loki C2:
http://missingandfound.com.my/limit/Panel/fre.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
71
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-27 12:34:02 UTC
File Type:
Binary (Archive)
Extracted files:
274
AV detection:
19 of 48 (39.58%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

gz 1e768e1570483ce3c47ac83ee64e70f37aca8a71e2db2a896ec8d313d8093ff8

(this sample)

  
Dropping
Loki
  
Delivery method
Distributed via e-mail attachment

Comments