ThreatFox IOC Database
You are viewing the ThreatFox database entry for url http://74f26d34ffff049368a6cff8812f86ee.ga/BN22/fre.php.
Database Entry
This IOC expired
This IOC is an old IOC and hence has expired on 2025-12-10 01:15:01 UTC. We therefore refrain from exporting it into our datasets. As a result, this database entry is purely informational and has no impact.
| IOC ID: | 190547 |
|---|---|
| IOC: | http://74f26d34ffff049368a6cff8812f86ee.ga/BN22/fre.php |
| IOC Type : | url |
| Threat Type : | botnet_cc |
| Malware: | Loki Password Stealer (PWS) |
| Malware alias: | Burkina, Loki, LokiBot, LokiPWS |
| Confidence Level : | Confidence level is high (100%) |
| First seen: | 2021-08-16 23:18:44 UTC |
| Last seen: | never |
| UUID: | 4d0a45b1-fee8-11eb-830d-42010aa4000a |
| Reporter | |
| Reward | 5 credits from ThreatFox |
| Tags: | Loki LokiBot |
| Reference: | https://tria.ge/210816-zbn2h59y3j/behavioral1 |
AndreGironda
MITRE T1566.001Date: Mon, 16 Aug 2021 23:22:07 +0100
Subject: Swift Copy for Advance Payment
From: aigerim.zhaxybekova@bsm.kz
Message-ID: <1ca7472414fc5b7257b7568a91b5224d@bsm.kz>
Sender IP: 185.22.64.95
Attachment Name: Bank Swift.xlsx
Attachment SHA256: a0846459f175f0d4b614759bf41caa01bcecbbf51a54b1278da7dc64ba884e29
http://198.12.91[.]144/rpm/vbc.exe b372ba907ad4c120ac6ddd86e8de1821d19dffef023bd32c18359bcf82326842
https://www.unpac.me/results/8e9aae56-5305-4546-8656-e7dd90210b11
Unpacked SHA256: 3d333a2fba13501aec4505ae3a58c7bc85f3cf57c2f8402b704f79121651564c
Malware Samples
The table below documents recent malware samples observed that are associated with this indicator of compromise (IOC).
| Time stamp (UTC) | SHA256 hash | Bazaar |
|---|---|---|
| 2021-08-23 07:05:40 | 672bfd2ee1ff418a1d0a969c4a8e548a359a389f31c12a720feb7b821975f8a5 |