Neurosoft | Cybersecurity, Technology and Field Services
  • CYBER
  • TECHNOLOGY
  • FIELD
  • INVESTOR RELATIONS
  • CAREERS
  • NEWS
  • CONTACT
  • Menu Menu
  • Link to LinkedIn
  • Link to X
  • Link to Facebook
  • Link to Instagram
  • Link to Youtube
News

Neutrify Malware Analysts Detect Spam Campaign | When Drake “meets” Lokibot

Neutrify, as part of the malware/abuse service that it provides, has captured two samples concerning a spam campaign that delivers 2 files. One of them is an injector and the other is the notorious Lokibot [1] information stealer.

Neutrify malware analysts analyzed the e-mail responsible for delivering the samples. They also extracted and reverse-engineered the samples in order to uncover their functionality and discover relevant Indicators of Compromise (IOCs). The latter will help to successfully protect Clients under the Continuous Monitoring Service provided by Neutrify. This report aims to present the results of this analysis and shares relevant IOCs with the Internet Security community.

To see the report click here.

August 31, 2020
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on LinkedIn
  • Share by Mail
https://neurosoft.gr/wp-content/uploads/2020/08/0.jpg 1200 1200 neurouser https://neurosoft.gr/wp-content/uploads/2024/02/2LogoNeurosoft2024.png neurouser2020-08-31 13:54:052025-07-01 16:42:02Neutrify Malware Analysts Detect Spam Campaign | When Drake “meets” Lokibot

Recent News

  • microsoft_cloud_threat_cybersecurity
    Microsoft Specialization in Cybersecurity AchievedNovember 6, 2025 - 2:45 pm
  • cybersecurity_AI
    The Thorn in My Website: Cybersecurity Awareness MonthOctober 30, 2025 - 1:47 pm
  • breast cancer awareness
    Pink@Work: Awareness Doesn’t Stop at CybersecurityOctober 24, 2025 - 4:26 pm
  • Compliance_webinar
    Compliance Automation: Business and Technology Leaders AskOctober 20, 2025 - 2:57 pm
  • Cisco_Connect_Networking
    Cisco Connect: The Next Day of Secure NetworkingOctober 9, 2025 - 1:50 pm
  • great place to work
    Great Place To Work: Our People, Our InvestmentSeptember 30, 2025 - 2:38 pm
  • Cybersecurity
    Fortinet Security Day: A Day Devoted to CybersecuritySeptember 18, 2025 - 1:40 pm
  • compliance
    Compliance with NIS 2: A Starting Point to Cyber ResilienceSeptember 4, 2025 - 12:29 pm
  • cybersecurity_phishing_remote
    Awareness: Your Summer Security SPFAugust 7, 2025 - 11:30 am
  • breach_cyberattacks
    Beach Season or Breach Season?July 30, 2025 - 3:13 pm

Corporate Responsibility.  Careers.  Certified Quality.  Privacy Policy.  Whistleblower Policy. 

© Copyright 2025 - Neurosoft S.A.
  • Link to LinkedIn
  • Link to X
  • Link to Facebook
  • Link to Instagram
  • Link to Youtube
Link to: Partnership with Microsoft Corporation Link to: Partnership with Microsoft Corporation Partnership with Microsoft Corporation Link to: Blueliv and Neurosoft Announce Strategic Partnership for Threat Intelligence Services Link to: Blueliv and Neurosoft Announce Strategic Partnership for Threat Intelligence Services threat intelligenceBlueliv and Neurosoft Announce Strategic Partnership for Threat Intelligence...
Scroll to top Scroll to top Scroll to top
Cookies
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}