MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b23c32dbe4951890a458ca3ce7b07f09bac52cb70e8cb0425877a6d36d357f6d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Loki


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: b23c32dbe4951890a458ca3ce7b07f09bac52cb70e8cb0425877a6d36d357f6d
SHA3-384 hash: 00f15fba8a5181d69d609bd214e1609011fea41f8bda8bd7cb5a876f782256f28d76c2ba5476944c7f7ae74561fbe5aa
SHA1 hash: c76aa825f20301266a77454d8197bbd8df7c0ae0
MD5 hash: 187d00fb43571b6c218e0fadaad01c6a
humanhash: north-comet-mountain-bacon
File name:Payment Advice_pdf.arj
Download: download sample
Signature Loki
File size:142'187 bytes
First seen:2021-02-12 01:51:46 UTC
Last seen:Never
File type: arj
MIME type:application/x-rar
ssdeep 3072:/O0KUqKZuStPrZ88fcxwGbxEGar05vmyydNStkJJI2k:GOZdtP9hfciGbqGz5eyydNSpt
TLSH E6D32332DADD28E68C7D287D76B1400C252692ED6BBC57F5593C28C990096FE13C2B63
Reporter cocaman
Tags:arj Loki


Avatar
cocaman
Malicious email (T1566.001)
From: ""Standard Chartered Bank" <advicesin@opsmarinetime.com>" (likely spoofed)
Received: "from opsmarinetime.com (maildc1519218099.mihandns.com [188.212.22.220]) "
Date: "Thu, 11 Feb 2021 04:26:49 -0500 (EST)"
Subject: "Payment Advice from Standard Chartered Bank"
Attachment: "Payment Advice_pdf.arj"

Intelligence


File Origin
# of uploads :
1
# of downloads :
122
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.SpyNoon
Status:
Malicious
First seen:
2021-02-12 02:07:50 UTC
File Type:
Binary (Archive)
Extracted files:
5
AV detection:
18 of 48 (37.50%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Loki

arj b23c32dbe4951890a458ca3ce7b07f09bac52cb70e8cb0425877a6d36d357f6d

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments