loic&hoicbysosogn91.zip
The file loic&hoicbysosogn91.zip has been detected as a potentially unwanted program by 26 anti-malware scanners. The file has been seen being downloaded from download1341.mediafire.com.
File name:
loic&hoicbysosogn91.zip
MD5:
7e70c7e8f016732a0196a621e804f3bb
SHA-1:
5373081d69d2177796ea240f6e5aa227eb654f34
SHA-256:
e5eda41d10597d3fda817c047cc69a92f4e2d0cc6eafa886d695766acfecaba1
Scanner detections:
26 / 68
Status:
Potentially unwanted
Analysis date:
4/25/2024 8:50:30 PM UTC (today)
Scan engine
Detection
Engine version
Lavasoft Ad-Aware
Gen:Variant.Application.HackTool.1
5758758
Agnitum Outpost
Riskware.HackTool
7.1.1
Avira AntiVirus
SPR/Tool.Hoylecann.A
8.3.2.2
Arcabit
Trojan.Application.HackTool.1
1.0.0.585
avast!
Win32:Trojan-gen
2014.9-151026
AVG
Luhe.MalMSIL.A
2016.0.2945
Bitdefender
Gen:Variant.Application.HackTool.1
1.0.20.1495
Clam AntiVirus
HackTool.DDOS.HOIC
0.98/21009
Emsisoft Anti-Malware
Gen:Variant.Application.HackTool
10.0.0.5366
ESET NOD32
Win32/HackTool.Agent.C potentially unsafe application
7.0.302.0
Fortinet FortiGate
Riskware/Loic
10/26/2015
F-Prot
W32/Loic.A (exact, not disinfectable)
4.6.5.141
F-Secure
Gen:Variant.Application.HackTool
11.2015-26-10_2
G Data
Gen:Variant.Application.HackTool
15.10.25
IKARUS anti.virus
not-a-virus.Hacktool.HOIC
t3scan.1.9.5.0
Kaspersky
HackTool.Win32.Hoic
15.0.0.543
McAfee
Trojan.Artemis!8E2E25233A2B
18.0.204.0
Microsoft Security Essentials
Threat.Undefined
1.209.158.0
MicroWorld eScan
Gen:Variant.Application.HackTool.1
16.0.0.897
NANO AntiVirus
Trojan.Win32.Hoic.drppuz
0.30.26.3947
Norman
Gen:Variant.Application.HackTool.1
22.10.2015 04:41:22
Quick Heal
HackTool.Hoic.g4 (Not a Virus)
10.15.14.00
Sophos
PUA 'High Orbit Ion Canon' (of type Hacktool)
5.20
Trend Micro House Call
HKTL_DDOS
7.2.299
Trend Micro
HKTL_DDOS
10.465.26
Vba32 AntiVirus
Hacktool.DDoSer.2321
3.12.26.4
File size:
2.3 MB (2,407,416 bytes)
Common path:
C:\users\{user}\downloads\loic&hoicbysosogn91.zip
The file loic&hoicbysosogn91.zip has been seen being distributed by the following URL.