MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 faa3a278a21f49f11e1b16046f40ee2a4ca3db0eba7c4639c20b58a9d647f99c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: faa3a278a21f49f11e1b16046f40ee2a4ca3db0eba7c4639c20b58a9d647f99c
SHA3-384 hash: cbf0c7c09d0982c2e818f00e35c1d146548e5db4482f59f62f4e7119ff9fae328563c5c0076287745966ff623eb50672
SHA1 hash: a594779f1d5bf7af732234dd1606561ec7ab3891
MD5 hash: e4536fe93a67b4ad00e10610353a6d5d
humanhash: massachusetts-yankee-march-social
File name:EXP DHL Reimb Exp InvU9422-PDF.gz
Download: download sample
Signature Loki
File size:343'923 bytes
First seen:2020-06-29 06:33:02 UTC
Last seen:Never
File type: gz
MIME type:application/gzip
ssdeep 6144:7IpfHMNA1gQN4gGQbBHQGHCP1+L7omeORRqIN/M3+5BJuG+Iq/jEaHm5R:MpfHMNA1zLi8Aw7oveplCIqb6L
TLSH 7A7423D74E964279F4F965D07AAEFCE7E253C7570C988030EFA02AB6064728C770B619
Reporter abuse_ch
Tags:DHL gz Loki


Avatar
abuse_ch
Malspam distributing Loki:

HELO: ezw02-outboundmail.oncloud.co.id
Sending IP: 117.54.5.20
From: Formal Delivery Clearance Support (DHL) <qiqi@multiguna-ip.co.id>
Subject: Electronic invoice generated by DHL Express_Invoice-MAJW-18-06-2020: Air Waybill no 1395482082
Attachment: EXP DHL Reimb Exp InvU9422-PDF.gz (contains "EXP DHL Reimb Exp InvU9422-PDF.exe")

Loki C2:
http://airmanselectiontest.com/dest/Panel/fre.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
60
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Infostealer.PonyStealer
Status:
Malicious
First seen:
2020-06-29 03:04:07 UTC
AV detection:
26 of 31 (83.87%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

gz faa3a278a21f49f11e1b16046f40ee2a4ca3db0eba7c4639c20b58a9d647f99c

(this sample)

  
Dropping
Loki
  
Delivery method
Distributed via e-mail attachment

Comments