MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 18f5870e37a3ea690c842a8493ffcf264768440797ef9193751de32ec5d000de. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 18f5870e37a3ea690c842a8493ffcf264768440797ef9193751de32ec5d000de
SHA3-384 hash: 6097933a4af1a80a42af40c5e91cae2f923b886a30a61a8e8acd9919ac2fd06b1451c766cc557aa4db09b66605727f54
SHA1 hash: 0e53daf06b6522bc0c744b3106aa60b2856f3c1c
MD5 hash: 258c5736934b3f8098e531de0b5d2976
humanhash: kitten-oklahoma-black-jupiter
File name:Payment slip for Inv-00GHM097 and Inv-00GKL087.gz
Download: download sample
Signature Loki
File size:427'852 bytes
First seen:2020-04-30 06:16:49 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 6144:MN6eVe1naa0ROfJVzj3YUXwx8Epo9yLl0x0xqB7E8jYFk3ot1EORl7RkzY45+xc4:bbs7GYIS82oAGx04EJF/tdb7Ru2xcaH
TLSH 1F94236EE1882E166C6F4E6E77F3A190F7BB0DED519894D0092204CF0E37996E5FD482
Reporter abuse_ch
Tags:gz Loki


Avatar
abuse_ch
Malspam distributing Loki:

HELO: vps.honeywell-egypt.com
Sending IP: 204.93.168.246
From: hana <hana@knapparel.com.vn>
Subject: Re: Payment Advise
Attachment: Payment slip for Inv-00GHM097 and Inv-00GKL087.gz (contains "Scan01_pdf.exe")

Loki C2:
http://rnarport.com/divide/five/fre.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
80
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-04-29 09:27:30 UTC
File Type:
Binary (Archive)
Extracted files:
41
AV detection:
24 of 30 (80.00%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

zip 18f5870e37a3ea690c842a8493ffcf264768440797ef9193751de32ec5d000de

(this sample)

  
Dropping
Loki
  
Delivery method
Distributed via e-mail attachment

Comments