ThreatFox IOC Database
You are viewing the ThreatFox database entry for url http://chrisupdated.xyz/ttboi/panel/five/fre.php.
Database Entry
This IOC expired
This IOC is an old IOC and hence has expired on 2025-12-15 01:15:01 UTC. We therefore refrain from exporting it into our datasets. As a result, this database entry is purely informational and has no impact.
| IOC ID: | 395088 |
|---|---|
| IOC: | http://chrisupdated.xyz/ttboi/panel/five/fre.php |
| IOC Type : | url |
| Threat Type : | botnet_cc |
| Malware: | Loki Password Stealer (PWS) |
| Malware alias: | Burkina, Loki, LokiBot, LokiPWS |
| Confidence Level : | Confidence level is high (100%) |
| ASN: | AS15169 GOOGLE |
| Country: | US |
| First seen: | 2022-03-14 05:40:29 UTC |
| Last seen: | never |
| UUID: | 41d2e9e4-a359-11ec-a022-42010aa4000a |
| Reporter | |
| Reward | 5 credits from ThreatFox |
| Tags: | Loki LokiBot LokiPWS |
| Reference: | https://tria.ge/220314-cgrh9abhc7 |
AndreGironda
MITRE T1566.001Date: Sun, 13 Mar 2022 18:30-19:00 -0700
Received: from pkz49.hoster.kz ([185.116.195.196])
MIME-Version: 1.0
From: HSBC Advising Service <office@oliveads.az>
To: undisclosed-recipients:;
Subject: Payment Advice - Advice Ref:[GLV922853603] / Priority payment / Customer Ref:[20212800000440]
Reply-To: HSBC Advising Service <goldminersasociationsci@gmail.com>
In-Reply-To: <75865bc7c98cfeef238079d0cbde2a50@oliveads.az>
References: <b3b72e42aa523221d3b2f97e4d8b2097@oliveads.az>
<86e9aaf5e41c1026072ec9ee276f4e9d@oliveads.az>
<37922fb6825e44813cd77c29320f0889@oliveads.az>
<78d6736e74c1df2b524f399bf0686960@oliveads.az>
<b71dac93bd77159181d125b3d68a7d68@oliveads.az>
<364a3446752e7a2b577931825cb5ff55@oliveads.az>
<741300bddb2776f96c722a8103df844a@oliveads.az>
<376888a814308cd20e44c22ff6f70457@oliveads.az>
<1fb9fb1da5000de74d53d1288a95ffcb@oliveads.az>
<ba20515fae20d632d8eca188f9a452af@oliveads.az>
<e72a413b070b3ca09bc8ae3dc485bb02@oliveads.az>
<6172ef0be7b9134fb1dd2074b3e443ec@oliveads.az>
<cbc65c3f00e43c263f891abfa7f69dcf@shanyrak-group.kz>
<45cac18522b71e9f9d68d0497a58b982@oliveads.az>
<44d9c88d040c11fa17cf1ee71d58f4cb@oliveads.az>
<2cdb2d898ff51a89513e9bc81484e8fa@oliveads.az>
<75865bc7c98cfeef238079d0cbde2a50@oliveads.az>
User-Agent: Roundcube Webmail/1.4.11
Message-ID: <21c103103b4fda72e347af2adf1c9d97@oliveads.az>
X-Sender: office@oliveads.az
Content-Type: multipart/mixed; boundary="=_418004eb39bb718e298674f5c507ff5e"
X-PPP-Message-ID: <20220314015753.91405.69044@pkz49.hoster.kz>
X-PPP-Vhost: shanyrak-group.kz
X-Originating-IP: 185.116.195.196
X-Report-Abuse-To: spam@spamexpert1.hoster.kz
Return-Path: office@oliveads.az
Attachment Name: Payment advice.xlsx
Maldoc SHA256: e2b80cac15b46c83dc2e5cdca8bf906ac014f3ebbdc7f35e150a05c8391cccfb
Stage URL: hXXp://107[.]172.13.168/88/vbc[.]exe
Stage Executable SHA256: 3bac0344ebff1e7192d779672d39d141347c4dd80e0b423b1988d2809ace7037
Malware Samples
The table below documents recent malware samples observed that are associated with this indicator of compromise (IOC).
| Time stamp (UTC) | SHA256 hash | Bazaar |
|---|---|---|
| 2022-03-14 08:31:37 | 3bac0344ebff1e7192d779672d39d141347c4dd80e0b423b1988d2809ace7037 |
US