MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 84e0438826a95865f0c61bb632ebcc984038cdf2efb505e475cd314b8531aad4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 84e0438826a95865f0c61bb632ebcc984038cdf2efb505e475cd314b8531aad4
SHA3-384 hash: ed5a8347cd500adde7d78cb98c29cc1a8644362f9bf981c929eb79b50b66e385219a1573b3cae51fb860ac100dd7c669
SHA1 hash: 5bfbf8022b7614548ada05acb73799f0a5456357
MD5 hash: 6509821ed23a75328ef3e6ab14c34bc1
humanhash: butter-black-yankee-arizona
File name:Scanconfidentail_file_pdf.gz
Download: download sample
Signature Loki
File size:293'589 bytes
First seen:2020-07-28 13:39:51 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 6144:c7QEmdWX9ju8BEsSGqRbk9EMkqUOI6+Vfs0aZALq2RzgAfHU8:CQEmduJLwjwI6+q9ZAfBgAP
TLSH BA5423670D56A835D963F12CA6ADF692352303C1DBE3521E211284B4C73BB1B29EC5DF
Reporter abuse_ch
Tags:CTBC gz Loki


Avatar
abuse_ch
Malspam distributing Loki:

HELO: mail.esipooaintl.cf
Sending IP: 155.94.211.77
From: CTBC BANK <fbs@ctbcbank.co.id>
Subject: CONFIDENTIAL ADVICE FROM CTBC BANK_
Attachment: Scanconfidentail_file_pdf.gz (contains "Scanconfidentail_file_pdf.exe")

Loki C2:
http://mito--cn.com/kaka/kaka1/fre.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
64
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-07-28 13:41:05 UTC
AV detection:
22 of 48 (45.83%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

zip 84e0438826a95865f0c61bb632ebcc984038cdf2efb505e475cd314b8531aad4

(this sample)

  
Dropping
Loki
  
Delivery method
Distributed via e-mail attachment

Comments