MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 222c6a3d4e2bdc59f2c5732355a495f3400e75a0388e1ce9bffc6be02cf6eda9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 222c6a3d4e2bdc59f2c5732355a495f3400e75a0388e1ce9bffc6be02cf6eda9
SHA3-384 hash: 6445faf0bcfc6cfdae281ab0703eb8d512f472e90fcd9197445b156fe44d603125aff68554d65bb6e83f791f357b6489
SHA1 hash: bc1c1ce6754dd2052ca7a76395b39326988458a4
MD5 hash: b7f6e173ad9be3781c5d6d2cc413a5c1
humanhash: river-virginia-table-green
File name:Bank Swift Report.r02
Download: download sample
Signature Loki
File size:300'629 bytes
First seen:2021-11-02 07:04:59 UTC
Last seen:Never
File type: r02
MIME type:application/x-rar
ssdeep 6144:cvRb8ewLP685WbnYjG792d2e8fTOmMW6QzMNikNpzm4PWQfm8rW:gYp5Wx792MTIFZi2pCGrW
TLSH T1D85423EEB170C42B6BC948934B217B1E2C68F6F099D9B7B5433958437470C60A77B6A3
Reporter cocaman
Tags:Loki r02 SWIFT


Avatar
cocaman
Malicious email (T1566.001)
From: "Jagadeesh B .N (Accounts & Logistics Incharge) <Jagadeesh@cvarvon.bar>" (likely spoofed)
Received: "from hp0.cvarvon.bar (unknown [159.65.41.195]) "
Date: "02 Nov 2021 07:21:32 +0100"
Subject: "Fwd: Payment Problem"
Attachment: "Bank Swift Report.r02"

Intelligence


File Origin
# of uploads :
1
# of downloads :
105
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Infostealer.Bulz
Status:
Malicious
First seen:
2021-11-02 07:05:15 UTC
AV detection:
10 of 44 (22.73%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

r02 222c6a3d4e2bdc59f2c5732355a495f3400e75a0388e1ce9bffc6be02cf6eda9

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Loki

Comments