ThreatFox IOC Database
You are viewing the ThreatFox database entry for url http://thammyvienanthea.com/onetime/playbook/onelove/fre.php.
Database Entry
This IOC expired
This IOC is an old IOC and hence has expired on 2025-12-24 01:15:01 UTC. We therefore refrain from exporting it into our datasets. As a result, this database entry is purely informational and has no impact.
| IOC ID: | 845721 |
|---|---|
| IOC: | http://thammyvienanthea.com/onetime/playbook/onelove/fre.php |
| IOC Type : | url |
| Threat Type : | botnet_cc |
| Malware: | Loki Password Stealer (PWS) |
| Malware alias: | Burkina, Loki, LokiBot, LokiPWS |
| Confidence Level : | Confidence level is high (100%) |
| ASN: | AS40034 CONFLUENCE-NETWORK-INC |
| Country: | US |
| First seen: | 2022-08-27 15:25:36 UTC |
| Last seen: | never |
| UUID: | 8000d426-261c-11ed-ae73-42010aa4000a |
| Reporter | |
| Reward | 5 credits from ThreatFox |
| Tags: | Loki |
Malware Samples
The table below documents recent malware samples observed that are associated with this indicator of compromise (IOC).
| Time stamp (UTC) | SHA256 hash | Bazaar |
|---|---|---|
| 2022-08-27 15:25:39 | a7cb7ee338eb9fb257e7bac8e36f6b8e8045a2a09349a3aadc4e8ca87d8c22f6 |
US