MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a4edb0c3c08076846743f4d75336dc91219b56de35d5a8661754afc2c784136f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: a4edb0c3c08076846743f4d75336dc91219b56de35d5a8661754afc2c784136f
SHA3-384 hash: 037345bb705c9ffad0ad3f8141306a0287b68d1ba04411bb950910f6d2ffa1e9b365198e9f0edbbd9aa36973745011e0
SHA1 hash: 0759ea532d2dbbef99a9f93d3a5fac4c68d6de3d
MD5 hash: 53cf5cb9701a49bc7577a6dc41a3f4d1
humanhash: mexico-dakota-burger-bakerloo
File name:Payment_Advice_pdf.arj
Download: download sample
Signature Loki
File size:493'282 bytes
First seen:2020-12-17 08:28:33 UTC
Last seen:Never
File type: arj
MIME type:application/x-rar
ssdeep 6144:5EmQd+vO29wj+XP11hS69ZzV7No8hvgAggr0HhAsjqh2Zx0IImCqFXupS38+7IxY:emk4ej+XdFpNo8hhEHhpSSXImRlOIC8z
TLSH B4A4237D3A61522BA61CDBCEFED403B580883083817437B5EBB46D59678649BF6E4EC0
Reporter abuse_ch
Tags:arj HSBC Loki


Avatar
abuse_ch
Malspam distributing Loki:

HELO: mail.panjunan.com
Sending IP: 103.31.224.54
From: HSBC Advising Service <hermawan.sundjaya@panjunan.com>
Subject: Payment Advice - Advice Ref:[GLV9020836098] / Priority payment / Customer Ref:[TT-340209800E-2]
Attachment: Payment_Advice_pdf.arj (contains "Payment_Advice_pdf.exe")

Loki C2:
http://webtex.ga/chang/gate.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
83
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Pwsx
Status:
Malicious
First seen:
2020-12-17 02:12:42 UTC
AV detection:
7 of 48 (14.58%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

arj a4edb0c3c08076846743f4d75336dc91219b56de35d5a8661754afc2c784136f

(this sample)

  
Dropping
Loki
  
Delivery method
Distributed via e-mail attachment

Comments