MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6e49537908e4ead2f49c096cd528c264f6beab9dbe83581259f00e1bda43997b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 6e49537908e4ead2f49c096cd528c264f6beab9dbe83581259f00e1bda43997b
SHA3-384 hash: 7236fd4d2782e6356665be405b7577cef0d5eb8bf30a6cbe6f31700fbd669e9c39158e872e7ff737f6fed7ab760595cd
SHA1 hash: 8c09467ee93818cb835556b726f51ac62947f240
MD5 hash: e6d36d4a7cd274b263c9d33c5fcc4f73
humanhash: tango-green-arkansas-sink
File name:Tender_documents_FOB_Offer_Printout.PDF.7z
Download: download sample
Signature Loki
File size:180'170 bytes
First seen:2021-01-18 08:33:55 UTC
Last seen:Never
File type: 7z
MIME type:application/x-7z-compressed
ssdeep 3072:AYxK1m60cX6wacp7XsXqvdSBMROpwvoecv3wCz+nsAzPvsM3hmcxDqr0B9CJda14:vM1maGQ78XydUgYLv3mnsAzsg00q8QY4
TLSH C50412A3B5464EFD9941A40E0D16891C742B2BE3DAF4395D08E5AFA6FEC0FD0B631139
Reporter abuse_ch
Tags:7z Loki


Avatar
abuse_ch
Malspam distributing Loki:

HELO: haitiangermany.com
Sending IP: 193.239.147.53
From: Emilia <sales@haitiangermany.com>
Subject: FW: Tender Documents FOB offer Cooperation // REF NO: NS109004
Attachment: Tender_documents_FOB_Offer_Printout.PDF.7z (contains "Tender_documents_FOB_Offer_Printout.PDF.exe")

Loki C2:
http://23.238.43.43/bb/fre.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
121
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-01-18 08:34:21 UTC
AV detection:
14 of 45 (31.11%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

7z 6e49537908e4ead2f49c096cd528c264f6beab9dbe83581259f00e1bda43997b

(this sample)

  
Dropping
Loki
  
Delivery method
Distributed via e-mail attachment

Comments