MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 cb1fea5772540a598a37ab9d8392195062b293d84f665dce40950bbb13bd9387. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 4
| SHA256 hash: | cb1fea5772540a598a37ab9d8392195062b293d84f665dce40950bbb13bd9387 |
|---|---|
| SHA3-384 hash: | 4ffdcbc96b50ad7bdab8b932b1604e854d75326b558130b73cba0385460a5f9b71fb54b11137e7ca55046efa78c46bfd |
| SHA1 hash: | b509c36e622aafa278d9b4c9ffaf31a5f4070b88 |
| MD5 hash: | 316d52237385415b2f60f7b9200d8883 |
| humanhash: | burger-stairway-carolina-three |
| File name: | FP Inv BPNIR00015564.pdf.gz |
| Download: | download sample |
| Signature | Loki |
| File size: | 372'513 bytes |
| First seen: | 2020-10-13 08:04:47 UTC |
| Last seen: | Never |
| File type: | gz |
| MIME type: | application/gzip |
| ssdeep | 6144:jr/L9sAoQuG7IdmtS5kL9Zb84I79VzQV/6wu5sZhKD7A6gYtwmP4Rqb5k:jrDoQP7LzupMDumZhKg6gWPNb5k |
| TLSH | 018423D370EA918F54BAB43B099BD8C6E488E9DDD27424F6F11AC3404FE39169A3D285 |
| Reporter | |
| Tags: | DHL gz Loki |
abuse_ch
Malspam distributing Loki:HELO: server.tuguhotels.com
Sending IP: 103.219.251.235
From: Ibrahim (DHL ID) <saigonsan@tuguhotels.com>
Subject: RE: Outstanding Invoice BPNIR00015564 with the Requested Paperwork
Attachment: FP Inv BPNIR00015564.pdf.gz (contains "FP Inv BPNIR00015564.pdf.exe")
Loki C2:
http://venitronics.com/oo/Panel/fre.php
Intelligence
File Origin
# of uploads :
1
# of downloads :
92
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-10-13 07:48:39 UTC
AV detection:
11 of 48 (22.92%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Lokibot
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
Loki
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.