ThreatFox IOC Database
You are viewing the ThreatFox database entry for url http://31.210.20.71/rich/fre.php.
Database Entry
This IOC expired
This IOC is an old IOC and hence has expired on 2025-12-15 01:15:01 UTC. We therefore refrain from exporting it into our datasets. As a result, this database entry is purely informational and has no impact.
| IOC ID: | 22195 |
|---|---|
| IOC: | http://31.210.20.71/rich/fre.php |
| IOC Type : | url |
| Threat Type : | botnet_cc |
| Malware: | Loki Password Stealer (PWS) |
| Malware alias: | Burkina, Loki, LokiBot, LokiPWS |
| Confidence Level : | Confidence level is high (100%) |
| ASN: | AS14178 Megacable_Comunicaciones_de_Mexico_S.A._de_C.V. |
| Country: | MX |
| First seen: | 2021-04-29 02:06:38 UTC |
| Last seen: | never |
| UUID: | 888abae9-a88f-11eb-a134-42010aa4000a |
| Reporter | |
| Reward | 5 credits from ThreatFox |
| Tags: | Loki |
Malware Samples
The table below documents recent malware samples observed that are associated with this indicator of compromise (IOC).
| Time stamp (UTC) | SHA256 hash | Bazaar |
|---|---|---|
| 2021-04-29 02:06:41 | 35ba0e8a4a8373ecec76c05c23ff10ea1d758872308c60aa299bcaa546e7a1eb |
MX