MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 98258b7b76a141f36cdef064cfbfea721dc530804cfa93e89f12ddc508ae72ee. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 98258b7b76a141f36cdef064cfbfea721dc530804cfa93e89f12ddc508ae72ee
SHA3-384 hash: 1c965f426c3279848377492798116430fad7a3e10d132bc05f9933e43af9def1fb011785e44eab759fb63d7746f45965
SHA1 hash: c21d871b5903de76ba46890f73e0b4522e1f675c
MD5 hash: 7d8ad16a7a9a27ff77c5bafa1d241e0e
humanhash: cola-solar-orange-pip
File name:Tender_documents_FOB_Offer_Printout.PDF.7z
Download: download sample
Signature Loki
File size:187'446 bytes
First seen:2021-01-19 07:33:54 UTC
Last seen:Never
File type: 7z
MIME type:application/x-7z-compressed
ssdeep 3072:+AajnDX2oSLufPOyrz+rz+7A/Svj0IMCDNHWjzXxHXO2j/e3erw6h6F48:+NjnDrSLuOMQ67A/uDdwXle2iKw6hb8
TLSH 86041248B5854985D0763874A48F0EF4EED7B6F0A25AAFDD417908B4C3EB7928FA4D03
Reporter abuse_ch
Tags:7z Loki


Avatar
abuse_ch
Malspam distributing Loki:

HELO: host.almuneer.biz
Sending IP: 85.214.167.20
From: Nihan <info@zerova.com.tr>
Subject: FW: RE: FOB Isbirligi teklifi // REF NO: NS109004
Attachment: Tender_documents_FOB_Offer_Printout.PDF.7z (contains "Tender_documents_FOB_Offer_Printout.PDF.exe")

Loki C2:
http://208.70.248.230/ty/fre.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
180
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-01-19 07:34:37 UTC
AV detection:
15 of 45 (33.33%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

7z 98258b7b76a141f36cdef064cfbfea721dc530804cfa93e89f12ddc508ae72ee

(this sample)

  
Dropping
Loki
  
Delivery method
Distributed via e-mail attachment

Comments