MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 572772b5948733d811d3ce58814d3327b66b852b870f88c3c167e769d4e21d66. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 4
| SHA256 hash: | 572772b5948733d811d3ce58814d3327b66b852b870f88c3c167e769d4e21d66 |
|---|---|
| SHA3-384 hash: | 99c084a9bec03266d5c4811635b5249e1dbaa495c024106834dae19f9edf423751d88fbcdfc298c5f379506ebf436ea4 |
| SHA1 hash: | e6f5512473d8092db34b1336ede011083b5ae9de |
| MD5 hash: | 537c60c5ca78445c95955d42254356af |
| humanhash: | freddie-mirror-pizza-ink |
| File name: | outstandinfg inovoices_pdf.gz |
| Download: | download sample |
| Signature | Loki |
| File size: | 372'534 bytes |
| First seen: | 2020-10-13 05:44:24 UTC |
| Last seen: | Never |
| File type: | gz |
| MIME type: | application/gzip |
| ssdeep | 6144:Y7hQqSg8WgQuZo5lM32HtzeT2rAZ6VTk0nuRPmzp7fWcR/hsadOrWCmHrrd3d1ke:YhQ8gQ2o56GteT2AwVT/SPy++xCGJXke |
| TLSH | F88423AB03F983E8086B30B445265D76628DE2DF19DA45F2C06D9837925CE70A8F94F7 |
| Reporter | |
| Tags: | gz Loki |
abuse_ch
Malspam distributing Loki:HELO: server.devbox12.com
Sending IP: 162.249.2.44
From: Kedar Malavade <kedar@rogersworldwideindia.com>
Reply-To: Kedar Malavade <ricknicolas.aol@hotmail.com>
Subject: CHECK INVOICES
Attachment: outstandinfg inovoices_pdf.gz (contains "outstandinfg inovoices_pdf.exe")
Loki C2:
http://milonga-a-promotora.pt/wp778/Panel/fre.php
Intelligence
File Origin
# of uploads :
1
# of downloads :
84
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.CryptInject
Status:
Malicious
First seen:
2020-10-13 02:13:01 UTC
AV detection:
6 of 48 (12.50%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Lokibot
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
Loki
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.