ThreatFox IOC Database
You are viewing the ThreatFox database entry for url http://161.35.102.56/~nikol/?p=27226656008.
Database Entry
This IOC expired
This IOC is an old IOC and hence has expired on 2026-01-16 01:15:01 UTC. We therefore refrain from exporting it into our datasets. As a result, this database entry is purely informational and has no impact.
| IOC ID: | 1127555 |
|---|---|
| IOC: | http://161.35.102.56/~nikol/?p=27226656008 |
| IOC Type : | url |
| Threat Type : | botnet_cc |
| Malware: | Loki Password Stealer (PWS) |
| Malware alias: | Burkina, Loki, LokiBot, LokiPWS |
| Confidence Level : | Confidence level is elevated (75%) |
| Is compromised? : | False |
| ASN: | AS14061 DIGITALOCEAN-ASN |
| Country: | US |
| First seen: | 2023-06-09 07:05:06 UTC |
| Last seen: | never |
| UUID: | f6f63273-0693-11ee-8292-42010aa4000a |
| Reporter | |
| Reward | 5 credits from ThreatFox |
| Tags: | LokiBot |
| Reference: | https://bazaar.abuse.ch/sample/f37ca6c053e17063d8622f5016bf9547e95a06704c1226fd8d09e88f33a52957/ |
Malware Samples
The table below documents recent malware samples observed that are associated with this indicator of compromise (IOC).
| Time stamp (UTC) | SHA256 hash | Bazaar |
|---|---|---|
| 2023-06-27 04:15:14 | e3a60c9d44679aa4a97d4a7d8c60e56dfc63243c126a8e92a92ba527dc4f5ee2 |
US