MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e3b9927181719dc678362dc544296fd1fb4e6617f89975eb73d8e469d27afa99. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Loki
Vendor detections: 4
| SHA256 hash: | e3b9927181719dc678362dc544296fd1fb4e6617f89975eb73d8e469d27afa99 |
|---|---|
| SHA3-384 hash: | 1b3abafd5269dd377a55bfac42fc10c71d9d8311df97f2f9ef8492f9a2149150fccf8530e2eec728f227402d820cbbe5 |
| SHA1 hash: | d071e1ef18cc14d101584c17dd04ef5ff628a1a5 |
| MD5 hash: | 8ae1ba9e43107863db3b643685dff104 |
| humanhash: | batman-lake-eight-victor |
| File name: | 电汇付款11,631.35欧元_____pdf.gz |
| Download: | download sample |
| Signature | Loki |
| File size: | 789'919 bytes |
| First seen: | 2021-01-18 08:05:09 UTC |
| Last seen: | Never |
| File type: | gz |
| MIME type: | application/x-rar |
| ssdeep | 24576:wsc5ePa2UcNoFX4xgEPJvxq45x+LSptGNI:wp6aAI4J445xfeI |
| TLSH | C3F423476321B432F5572458ACF10B264D295A4BFAA8518CE2B3DF1B325F62DF3C69C2 |
| Reporter | |
| Tags: | CHN geo gz Loki |
abuse_ch
Malspam distributing Loki:HELO: zephir.ph
Sending IP: 45.137.22.41
From: wylie.wang <info@zephir.ph>
Subject: 电汇付款11,631.35欧元
Attachment: 电汇付款11,631.35欧元_____pdf.gz (contains "电汇付款11,631.35欧元_____pdf.exe")
Loki C2:
http://becharnise.ir/fa2/fre.php
Intelligence
File Origin
# of uploads :
1
# of downloads :
104
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Bulz
Status:
Malicious
First seen:
2021-01-18 08:05:18 UTC
AV detection:
10 of 46 (21.74%)
Threat level:
5/5
Detection(s):
Malicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropping
Loki
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.