MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 13cf4d9948c4d98fc8c0c8211733d7ba6af4bc08067fe29d93019fffd8007816. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 13cf4d9948c4d98fc8c0c8211733d7ba6af4bc08067fe29d93019fffd8007816
SHA3-384 hash: 12349fef81ea2bc8dc8c378b73024e68ec5d88279bad7cb01641939ffc80905b98262ad923391d92f435e639c30bb696
SHA1 hash: e0057a448a1f2a3b498793daf14d70c591d35ea5
MD5 hash: ee156205d661b1d824f9fb66ded1356a
humanhash: spring-oscar-connecticut-fillet
File name:Tender_documents_FOB_Offer_Printout.PDF.7z
Download: download sample
Signature Loki
File size:178'348 bytes
First seen:2021-01-18 08:23:02 UTC
Last seen:2021-01-20 19:46:31 UTC
File type: 7z
MIME type:application/x-7z-compressed
ssdeep 3072:cX8QfUdPxxXHfQ7zBSu1VyoOYfLHXmuvXcXFTBz6qZveyxovudFZhfP:csQfOxvUIu1VrOYfL3muktBmsey7dFZJ
TLSH E20412E77E038878E66E56431DB3538F9312F0E14209D576FC392EEC10A1895BDE68E9
Reporter abuse_ch
Tags:7z geo Loki TUR


Avatar
abuse_ch
Malspam distributing Loki:

HELO: baharmakine.com.tr
Sending IP: 193.239.147.53
From: Özgül<info@baharmakine.com.tr>
Subject: FW: İhale Belgeleri FOB İşbirliği Teklifi // REF NO: NS109004
Attachment: Tender_documents_FOB_Offer_Printout.PDF.7z (contains "Tender_documents_FOB_Offer_Printout.PDF.exe")

Loki C2:
http://23.238.43.43/tsc/fre.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
111
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-01-18 08:23:05 UTC
AV detection:
16 of 45 (35.56%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

7z 13cf4d9948c4d98fc8c0c8211733d7ba6af4bc08067fe29d93019fffd8007816

(this sample)

  
Dropping
Loki
  
Delivery method
Distributed via e-mail attachment

Comments