MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 59bcc0b6a986189e42c2d50b4591abaaf327dea176bb95a267d9614a5b8792b0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 4
| SHA256 hash: | 59bcc0b6a986189e42c2d50b4591abaaf327dea176bb95a267d9614a5b8792b0 |
|---|---|
| SHA3-384 hash: | ef79e6e4ee42d6e16132b1222a378d4219b63d926e347a16869339a8ad66fb95f5656cca206282ff4a8021a191032f71 |
| SHA1 hash: | 1d8fd09a5fe89331178e055dfca3697074459ee6 |
| MD5 hash: | 1c0add8948e35ca92a4a7a3a4af341ea |
| humanhash: | edward-minnesota-fruit-johnny |
| File name: | RE BANK SLIP.gz |
| Download: | download sample |
| Signature | Loki |
| File size: | 359'277 bytes |
| First seen: | 2020-10-12 07:34:34 UTC |
| Last seen: | Never |
| File type: | gz |
| MIME type: | application/gzip |
| ssdeep | 6144:U5ZMALWUMuStuzjiy2BHTYNWsJfwktQts+0Yk/wyYEuYHUxmpkyELN0tbLxXel:0ZM+i7JyMHTYNWsJISQtGYmwrEupxmpE |
| TLSH | 967423E4D14BE09EB25DCC648C632E2F65ED3A5E2F8ED0D1047AF96D73726200B6624D |
| Reporter | |
| Tags: | gz Loki |
abuse_ch
Malspam distributing Loki:HELO: server.tuguhotels.com
Sending IP: 103.219.251.235
From: CMA CGM INDONESIA-RIAU BRANCH <saigonsan@tuguhotels.com>
Subject: RE: BANK SLIP DO CHARGES BL S1200800071 / AIS0284692 -- REQUEST COPY BL = VESSEL : SEAGATE 2705 / V.20S126W - ETA : 22/09/2020 // RI-LEC-EL06-0003
Attachment: RE BANK SLIP.gz (contains "RE BANK SLIP.exe")
Loki C2:
http://venitronics.com/oo/Panel/fre.php
Intelligence
File Origin
# of uploads :
1
# of downloads :
82
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.CryptInject
Status:
Malicious
First seen:
2020-10-12 07:17:48 UTC
AV detection:
7 of 48 (14.58%)
Threat level:
5/5
Detection(s):
Suspicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Lokibot
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
Loki
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.