MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 98c6c71a14c357296a1d9a2a2d5751451d06b05719455c1e97be71dd454136e4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 98c6c71a14c357296a1d9a2a2d5751451d06b05719455c1e97be71dd454136e4
SHA3-384 hash: 13367d9231dc5c0d5743920af387dd4faa9c7f25758ea4d4f508ab24c2a87d789893c17865de898c535aad55ed113075
SHA1 hash: f886e0a7a97f97171d5f04bca766bf4ce2b84979
MD5 hash: 455250b0da9ac28a3f7b03e8ed5c874a
humanhash: colorado-oven-twelve-georgia
File name:Tender_documents_FOB_Offer_Printout.PDF.r00
Download: download sample
Signature Loki
File size:181'715 bytes
First seen:2021-01-18 08:21:00 UTC
Last seen:Never
File type: r00
MIME type:application/x-rar
ssdeep 3072:hVrs7E2r3mR8DLTWpGFhyDijlm3B7OGd6QOXwzGf5dDLXfyP1OA1ryDVsT7Z+ZT:vw7E2KRaLIDijlqB6GdRIwzGfnXoxySG
TLSH BE0412E00E0970B8BCEC8D2D7674ADC353936D56A767C88DC17F12E94790607E4AAE74
Reporter abuse_ch
Tags:geo Loki r00 TUR


Avatar
abuse_ch
Malspam distributing Loki:

HELO: telif.gov.tr
Sending IP: 193.239.147.53
From: Eymen Mustafa<turkey@telif.gov.tr>
Subject: FW: İhale Belgeleri FOB İşbirliği Teklifi // REF NO: NS109004
Attachment: Tender_documents_FOB_Offer_Printout.PDF.r00 (contains "Tender_documents_FOB_Offer_Printout.PDF.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
102
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-01-18 08:21:05 UTC
AV detection:
18 of 44 (40.91%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

r00 98c6c71a14c357296a1d9a2a2d5751451d06b05719455c1e97be71dd454136e4

(this sample)

  
Dropping
Loki
  
Delivery method
Distributed via e-mail attachment

Comments