MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 52aa2022c80fe0a75b743bca8a24d1b9ceed1fa08aa4c5bd9978dddf29674262. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 52aa2022c80fe0a75b743bca8a24d1b9ceed1fa08aa4c5bd9978dddf29674262
SHA3-384 hash: 3f1513035185ca8bd6ab6a6685cb431aa044198b767becee3d971016a017f6d97f9c52bc0684ae2cb7e1cb1aa40cbbb6
SHA1 hash: 17b01ad2f6d66e66ac84a68c76bcb1f21b29e5de
MD5 hash: 21d79eb248468020ca18981d006a0026
humanhash: lion-blue-skylark-mississippi
File name:UIF COVID-19 June 2020 Payment Approval.pdf.gz
Download: download sample
Signature Loki
File size:149'785 bytes
First seen:2020-06-12 09:47:29 UTC
Last seen:Never
File type: gz
MIME type:application/gzip
ssdeep 3072:FvPjM2c1fp49kaTd8CU8u8hkaGP7ZG/fhJ57jV7K6e2mDZ+ED+i7:FvO4yadBU8Gar/5vpK6e20ZVS4
TLSH 5BE312F18FB2D4E5C0166BA71503AFE4C0EFE3F799B9A629984A4EDC247109A71503C7
Reporter abuse_ch
Tags:gz Loki


Avatar
abuse_ch
Malspam distributing Loki:

HELO: neo.brilliantweb.co.za
Sending IP: 72.52.186.61
From: uifcovid19@labour.gov.za
Subject: UIF COVID-19: June 2020 Payment Approval
Attachment: UIF COVID-19 June 2020 Payment Approval.pdf.gz (contains "UIF COVID-19 June 2020 Payment Approval.pdf.exe")

Loki C2:
http://auongo.com/~zadmin/lk/dn/gate.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
68
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.DanaBot
Status:
Malicious
First seen:
2020-06-12 09:49:05 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

gz 52aa2022c80fe0a75b743bca8a24d1b9ceed1fa08aa4c5bd9978dddf29674262

(this sample)

  
Dropping
Loki
  
Delivery method
Distributed via e-mail attachment

Comments