ThreatFox IOC Database
You are viewing the ThreatFox database entry for url http://162.0.223.13/?0ZbRoqHjbXfrX54fnD4rBmzDYlyFq8Yr7ajvA0OLY4dV9iaxVfYwByaATIgkQeLXp4tZ5i.
Database Entry
This IOC expired
This IOC is an old IOC and hence has expired on 2025-12-24 01:15:01 UTC. We therefore refrain from exporting it into our datasets. As a result, this database entry is purely informational and has no impact.
| IOC ID: | 851267 |
|---|---|
| IOC: | http://162.0.223.13/?0ZbRoqHjbXfrX54fnD4rBmzDYlyFq8Yr7ajvA0OLY4dV9iaxVfYwByaATIgkQeLXp4tZ5i |
| IOC Type : | url |
| Threat Type : | botnet_cc |
| Malware: | Loki Password Stealer (PWS) |
| Malware alias: | Burkina, Loki, LokiBot, LokiPWS |
| Confidence Level : | Confidence level is high (100%) |
| ASN: | AS22612 NAMECHEAP-NET |
| Country: | US |
| First seen: | 2022-09-23 05:40:32 UTC |
| Last seen: | 2022-09-27 15:45:52 UTC |
| UUID: | 3d479cd0-3b02-11ed-ae73-42010aa4000a |
| Reporter | |
| Reward | 5 credits from ThreatFox |
| Tags: | Loki |
Malware Samples
The table below documents recent malware samples observed that are associated with this indicator of compromise (IOC).
| Time stamp (UTC) | SHA256 hash | Bazaar |
|---|---|---|
| 2022-09-23 05:40:34 | 66f1a748e30aaa66b2053848270d68f5dc3ec9ccd4b9a5dbaa6a6dfd3139490c |
US