ThreatFox IOC Database
You are viewing the ThreatFox database entry for url http://94.156.177.41/ugopounds/five/fre.php.
Database Entry
This IOC expired
This IOC is an old IOC and hence has expired on 2025-12-26 01:15:01 UTC. We therefore refrain from exporting it into our datasets. As a result, this database entry is purely informational and has no impact.
| IOC ID: | 1513442 |
|---|---|
| IOC: | http://94.156.177.41/ugopounds/five/fre.php |
| IOC Type : | url |
| Threat Type : | botnet_cc |
| Malware: | Loki Password Stealer (PWS) |
| Malware alias: | Burkina, Loki, LokiBot, LokiPWS |
| Confidence Level : | Confidence level is elevated (75%) |
| ASN: | AS214943 RAILNET |
| Country: | US |
| First seen: | 2025-04-29 04:20:18 UTC |
| Last seen: | 2025-06-06 16:31:53 UTC |
| UUID: | 41d803e0-24b1-11f0-adfc-42010aa4000a |
| Reporter | |
| Reward | 5 credits from ThreatFox |
| Tags: | LokiBot |
| Reference: | https://bazaar.abuse.ch/sample/b062be5b786aeb8882c657ebea361f3157a16d4c5e9557947e6e74c0e7929963/ |
Malware Samples
The table below documents recent malware samples observed that are associated with this indicator of compromise (IOC).
US