MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 561a1b57ba1a569e68577a1ee9c347aecf79e1ad4946be6ddd056c5d1369415e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 561a1b57ba1a569e68577a1ee9c347aecf79e1ad4946be6ddd056c5d1369415e
SHA3-384 hash: 6e2dd177e832a871c9c4dc64cbc46438f56f206e9347843ac4b7336d9b592ac10277db8524b77a764a8fb49a632aeaaf
SHA1 hash: 0c7a59bac0727798197b7c593547f11cdb6ee4c5
MD5 hash: c53452865d4565176978f3c2f5e71ec3
humanhash: item-neptune-chicken-mirror
File name:GA454NPHTQTHRUPUTLOC2.PDF.gz
Download: download sample
Signature Loki
File size:352'357 bytes
First seen:2020-12-03 08:33:09 UTC
Last seen:Never
File type: gz
MIME type:application/gzip
ssdeep 6144:Lc7sdq7TrdoeTTx7UhTLV7dlFz8JpBqHK/sFcId13nOlq8lFxsrIWhkZ:Lc7sITp7t7UtfI0q/ccIbnOlqq7srPO
TLSH 307423C885C9B921B610A768F01742477CF6B8CB2AC8B43610C537BAED0E13757B5EB6
Reporter abuse_ch
Tags:gz Loki


Avatar
abuse_ch
Malspam distributing Loki:

HELO: host5.yournethost.com
Sending IP: 67.227.240.192
From: HDFC Bank LTD, Mumbai <sri.gustina@okansa.com>
Subject: RE: GA454NPHTQ - Deposit Report - Pickup Loc
Attachment: GA454NPHTQTHRUPUTLOC2.PDF.gz (contains "GA454NPHTQTHRUPUTLOC2.PDF.exe")

Loki C2:
http://airmanselectiontest.com/cest/Panel/fre.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
127
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Backdoor.Remcos
Status:
Malicious
First seen:
2020-12-03 08:34:05 UTC
AV detection:
17 of 28 (60.71%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

gz 561a1b57ba1a569e68577a1ee9c347aecf79e1ad4946be6ddd056c5d1369415e

(this sample)

  
Dropping
Loki
  
Delivery method
Distributed via e-mail attachment

Comments