← Back to SOC feed Coverage →

ThreatFox: Loki Password Stealer (PWS) IOCs

ioc-hunt HIGH ThreatFox
UrlClickEvents
infostealeriocthreatfoxwin-lokipws
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at ThreatFox →
Retrieved: 2026-05-12T23:00:00Z · Confidence: high

Hunt Hypothesis

The Loki Password Stealer is exfiltrating credentials through unusual network traffic and lateral movement, indicating a persistent threat to sensitive data. SOC teams should proactively hunt for this behavior in Azure Sentinel to detect and mitigate credential theft before data exfiltration occurs.

IOC Summary

Malware Family: Loki Password Stealer (PWS) Total IOCs: 2 IOC Types: url

TypeValueThreat TypeFirst SeenConfidence
urlhxxps://duclongetc.com/vvvv/need/work/Panel/five/fre.php?botnet_cc2026-05-1275%
urlhxxp://duclongetc.com/vvvv/need/work/Panel/five/fre.phpbotnet_cc2026-05-12100%

KQL: Url Hunt

// Hunt for access to known malicious URLs
// Source: ThreatFox - Loki Password Stealer (PWS)
let malicious_urls = dynamic(["https://duclongetc.com/vvvv/need/work/Panel/five/fre.php?", "http://duclongetc.com/vvvv/need/work/Panel/five/fre.php"]);
UrlClickEvents
| where Url has_any (malicious_urls)
| project Timestamp, AccountUpn, Url, ActionType, IsClickedThrough
| order by Timestamp desc

Required Data Sources

Sentinel TableNotes
UrlClickEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://threatfox.abuse.ch/browse/malware/win.lokipws/