File name:

182080c6af6a1ea7ea5de8ca186b3d9b.exe

Full analysis: https://app.any.run/tasks/cf425c61-c746-4666-ac79-e28b00d5a82b
Verdict: Malicious activity
Threats:

LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals.

Analysis date: December 02, 2023, 16:59:23
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
trojan
lokibot
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

182080C6AF6A1EA7EA5DE8CA186B3D9B

SHA1:

FDCF07C5BC5546E36145093E22588E031BBE7910

SHA256:

0D8258AC56CFEBD66CDAB0A4A75E6938107978F6314C2E287089ABF9009CAD44

SSDEEP:

6144:rDeSvI3/I6EZzcYFifyzHh1cbahPKpGnqx/pCS/wRFDRJdG:/8/I6ERcYw+rcah4GnqxgPJdG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LOKIBOT has been detected (YARA)

      • 182080c6af6a1ea7ea5de8ca186b3d9b.exe (PID: 2992)
    • Steals credentials from Web Browsers

      • 182080c6af6a1ea7ea5de8ca186b3d9b.exe (PID: 2992)
    • Drops the executable file immediately after the start

      • 182080c6af6a1ea7ea5de8ca186b3d9b.exe (PID: 2992)
    • Lokibot is detected

      • 182080c6af6a1ea7ea5de8ca186b3d9b.exe (PID: 2992)
    • Connects to the CnC server

      • 182080c6af6a1ea7ea5de8ca186b3d9b.exe (PID: 2992)
    • Actions looks like stealing of personal data

      • 182080c6af6a1ea7ea5de8ca186b3d9b.exe (PID: 2992)
  • SUSPICIOUS

    • Reads the Internet Settings

      • 182080c6af6a1ea7ea5de8ca186b3d9b.exe (PID: 2992)
    • Accesses Microsoft Outlook profiles

      • 182080c6af6a1ea7ea5de8ca186b3d9b.exe (PID: 2992)
  • INFO

    • Checks supported languages

      • 182080c6af6a1ea7ea5de8ca186b3d9b.exe (PID: 2992)
    • Reads the computer name

      • 182080c6af6a1ea7ea5de8ca186b3d9b.exe (PID: 2992)
    • Reads the machine GUID from the registry

      • 182080c6af6a1ea7ea5de8ca186b3d9b.exe (PID: 2992)
    • Creates files or folders in the user directory

      • 182080c6af6a1ea7ea5de8ca186b3d9b.exe (PID: 2992)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

LokiBot

(PID) Process(2992) 182080c6af6a1ea7ea5de8ca186b3d9b.exe
C2https://sempersim.su/a16/fre.php
Decoys (4)kbfvzoboss.bid/alien/fre.php
alphastand.trade/alien/fre.php
alphastand.win/alien/fre.php
alphastand.top/alien/fre.php
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (41)
.exe | Win64 Executable (generic) (36.3)
.dll | Win32 Dynamic Link Library (generic) (8.6)
.exe | Win32 Executable (generic) (5.9)
.exe | Clipper DOS Executable (2.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:06:04 09:21:08+02:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 197120
InitializedDataSize: 3768320
UninitializedDataSize: -
EntryPoint: 0x8bba
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 25.0.0.0
ProductVersionNumber: 61.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Unknown (0373)
CharacterSet: Unknown (63B6)
FileDescriptions: Buttiskarf
InternalName: FlyVilkings.exe
LegalTrademark1: Fascal
OriginalFileName: Lameros.exe
ProductName: Jadocka
ProductVersion: 57.38.36
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
32
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #LOKIBOT 182080c6af6a1ea7ea5de8ca186b3d9b.exe

Process information

PID
CMD
Path
Indicators
Parent process
2992"C:\Users\admin\AppData\Local\Temp\182080c6af6a1ea7ea5de8ca186b3d9b.exe" C:\Users\admin\AppData\Local\Temp\182080c6af6a1ea7ea5de8ca186b3d9b.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\182080c6af6a1ea7ea5de8ca186b3d9b.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
LokiBot
(PID) Process(2992) 182080c6af6a1ea7ea5de8ca186b3d9b.exe
C2https://sempersim.su/a16/fre.php
Decoys (4)kbfvzoboss.bid/alien/fre.php
alphastand.trade/alien/fre.php
alphastand.win/alien/fre.php
alphastand.top/alien/fre.php
Total events
875
Read events
873
Write events
2
Delete events
0

Modification events

(PID) Process:(2992) 182080c6af6a1ea7ea5de8ca186b3d9b.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2992) 182080c6af6a1ea7ea5de8ca186b3d9b.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
1
Suspicious files
3
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
2992182080c6af6a1ea7ea5de8ca186b3d9b.exeC:\Users\admin\AppData\Roaming\03B51E\EE03AE.exeexecutable
MD5:182080C6AF6A1EA7EA5DE8CA186B3D9B
SHA256:0D8258AC56CFEBD66CDAB0A4A75E6938107978F6314C2E287089ABF9009CAD44
2992182080c6af6a1ea7ea5de8ca186b3d9b.exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3896776584-4254864009-862391680-1000\0f5007522459c86e95ffcc62f32308f1_eeeb5d54-7880-42a7-b542-739bbc26cf4bbinary
MD5:D898504A722BFF1524134C6AB6A5EAA5
SHA256:878F32F76B159494F5A39F9321616C6068CDB82E88DF89BCC739BBC1EA78E1F9
2992182080c6af6a1ea7ea5de8ca186b3d9b.exeC:\Users\admin\AppData\Roaming\03B51E\EE03AE.hdbtext
MD5:220587F98330ADC8265A38DEF5AE6698
SHA256:06EADF590BA1AC74617FA0D4F21733155826DD72D0F0EFFD068F308182B78E8F
2992182080c6af6a1ea7ea5de8ca186b3d9b.exeC:\Users\admin\AppData\Roaming\03B51E\EE03AE.lckbinary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
8
DNS requests
3
Threats
13

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2992
182080c6af6a1ea7ea5de8ca186b3d9b.exe
POST
404
104.237.252.65:80
http://sempersim.su/a16/fre.php
unknown
text
15 b
unknown
2992
182080c6af6a1ea7ea5de8ca186b3d9b.exe
POST
104.237.252.65:80
http://sempersim.su/a16/fre.php
unknown
unknown
2992
182080c6af6a1ea7ea5de8ca186b3d9b.exe
POST
404
104.237.252.65:80
http://sempersim.su/a16/fre.php
unknown
binary
23 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
1956
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
324
svchost.exe
224.0.0.252:5355
unknown
2992
182080c6af6a1ea7ea5de8ca186b3d9b.exe
104.237.252.65:80
sempersim.su
DEDICATED-FIBER-COMMUNICATIONS
US
unknown

DNS requests

Domain
IP
Reputation
sempersim.su
  • 104.237.252.65
unknown
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
324
svchost.exe
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
324
svchost.exe
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
2992
182080c6af6a1ea7ea5de8ca186b3d9b.exe
A Network Trojan was detected
ET MALWARE LokiBot User-Agent (Charon/Inferno)
2992
182080c6af6a1ea7ea5de8ca186b3d9b.exe
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
2992
182080c6af6a1ea7ea5de8ca186b3d9b.exe
Malware Command and Control Activity Detected
ET MALWARE LokiBot Checkin
2992
182080c6af6a1ea7ea5de8ca186b3d9b.exe
A Network Trojan was detected
ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
2992
182080c6af6a1ea7ea5de8ca186b3d9b.exe
A Network Trojan was detected
ET MALWARE LokiBot User-Agent (Charon/Inferno)
2992
182080c6af6a1ea7ea5de8ca186b3d9b.exe
Malware Command and Control Activity Detected
ET MALWARE LokiBot Checkin
2992
182080c6af6a1ea7ea5de8ca186b3d9b.exe
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
2992
182080c6af6a1ea7ea5de8ca186b3d9b.exe
Malware Command and Control Activity Detected
ET MALWARE LokiBot Request for C2 Commands Detected M1
2 ETPRO signatures available at the full report
No debug info