File name:

2018-05-07-Lokibot-malspam-attachment.rar

Full analysis: https://app.any.run/tasks/61271dc0-0dba-43fd-a2a7-b4db2bdf5668
Verdict: Malicious activity
Threats:

LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals.

Analysis date: April 28, 2025, 02:20:41
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
stealer
lokibot
trojan
Indicators:
MIME: application/x-rar
File info: RAR archive data, v4, os: Win32
MD5:

FE4D2EFC3BADA5A2CBA7B6217C5D9C3F

SHA1:

A46D090FC70E51EE79233D2F57F57A916C920BCB

SHA256:

A07BE9EDB1B2E1881647EBF1A34F7E426AB2F0698DC21158C488FF74C02BFC07

SSDEEP:

3072:fFkUOD+k0RIfuOPvywznRjYskjqd3BMtkdslOytiErQeh/e2f/pQFexQ:+0IfFHyMPkju3Skds0ytiErF1p8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 7152)
    • Starts Visual C# compiler

      • New order.exe (PID: 5984)
    • LOKIBOT mutex has been found

      • vbc.exe (PID: 4244)
    • Steals credentials from Web Browsers

      • vbc.exe (PID: 4244)
    • Actions looks like stealing of personal data

      • vbc.exe (PID: 4244)
    • Scans artifacts that could help determine the target

      • vbc.exe (PID: 4244)
    • Connects to the CnC server

      • vbc.exe (PID: 4244)
    • Lokibot is detected

      • vbc.exe (PID: 4244)
    • LOKIBOT has been detected (SURICATA)

      • vbc.exe (PID: 4244)
  • SUSPICIOUS

    • Uses .NET C# to load dll

      • New order.exe (PID: 5984)
    • The process executes VB scripts

      • New order.exe (PID: 5984)
    • Executable content was dropped or overwritten

      • csc.exe (PID: 5964)
      • vbc.exe (PID: 4244)
    • Reads security settings of Internet Explorer

      • vbc.exe (PID: 4244)
    • Process drops legitimate windows executable

      • vbc.exe (PID: 4244)
    • Contacting a server suspected of hosting an CnC

      • vbc.exe (PID: 4244)
  • INFO

    • Reads the computer name

      • New order.exe (PID: 5984)
      • vbc.exe (PID: 4244)
    • Reads the machine GUID from the registry

      • New order.exe (PID: 5984)
      • csc.exe (PID: 5964)
      • vbc.exe (PID: 4244)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7152)
    • Checks supported languages

      • New order.exe (PID: 5984)
      • cvtres.exe (PID: 4464)
      • csc.exe (PID: 5964)
      • vbc.exe (PID: 4244)
    • Create files in a temporary directory

      • New order.exe (PID: 5984)
      • cvtres.exe (PID: 4464)
      • csc.exe (PID: 5964)
    • Manual execution by a user

      • New order.exe (PID: 5984)
    • Reads Microsoft Office registry keys

      • vbc.exe (PID: 4244)
    • Creates files or folders in the user directory

      • vbc.exe (PID: 4244)
    • The sample compiled with english language support

      • vbc.exe (PID: 4244)
    • Checks proxy server information

      • slui.exe (PID: 6004)
    • Reads the software policy settings

      • slui.exe (PID: 6004)
      • slui.exe (PID: 6132)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v-4.x) (58.3)
.rar | RAR compressed archive (gen) (41.6)

EXIF

ZIP

FileVersion: RAR v4
CompressedSize: 130909
UncompressedSize: 158208
OperatingSystem: Win32
ModifyDate: 2018:05:07 07:47:22
PackingMethod: Normal
ArchivedFileName: New order.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
10
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe new order.exe no specs csc.exe conhost.exe no specs cvtres.exe no specs #LOKIBOT vbc.exe slui.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
3332C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
4244"C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
New order.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual Basic Command Line Compiler
Exit code:
3221225477
Version:
8.0.50727.9149
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\vbc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
4464C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES4320.tmp" "c:\Users\admin\AppData\Local\Temp\CSC6CF7CB047E6F48708A94EED7E796E95.TMP"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
14.32.31326.0
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5964"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\jbg4fjco.cmdline"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
New order.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5984"C:\Users\admin\Desktop\New order.exe" C:\Users\admin\Desktop\New order.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\new order.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6004C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6080\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6132"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msxml6.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\ondemandconnroutehelper.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\webio.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\winnsi.dll
7152"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\2018-05-07-Lokibot-malspam-attachment.rarC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
9 995
Read events
9 957
Write events
25
Delete events
13

Modification events

(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\2018-05-07-Lokibot-malspam-attachment.rar
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(7152) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
3
Suspicious files
7
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
4244vbc.exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1693682860-607145093-2874071422-1001\0f5007522459c86e95ffcc62f32308f1_bb926e54-e3ca-40fd-ae90-2764341e7792binary
MD5:D898504A722BFF1524134C6AB6A5EAA5
SHA256:878F32F76B159494F5A39F9321616C6068CDB82E88DF89BCC739BBC1EA78E1F9
5964csc.exeC:\Users\admin\AppData\Local\Temp\CSC6CF7CB047E6F48708A94EED7E796E95.TMPbinary
MD5:063A19A3A1184135FE0E06200F031B1B
SHA256:D66E48B01FB53235C24352C08A00B5B53B2D3BC642691DBE79F833D962CBF655
4464cvtres.exeC:\Users\admin\AppData\Local\Temp\RES4320.tmpbinary
MD5:5589D54760F4F197CC3E45CC7F852C36
SHA256:FA60E1D221364BF25A4C7C4739DBE1BC337C78FC3852FE56248EE868A6DF7ACE
5964csc.exeC:\Users\admin\AppData\Local\Temp\jbg4fjco.pdbbinary
MD5:16BADD2A41AFF96575D997BDE62D7B9A
SHA256:87B9A05A9883EF7769C64C324C699A676FFD083F9EDB617BC2D1B50E84F93069
5984New order.exeC:\Users\admin\AppData\Local\Temp\jbg4fjco.0.cstext
MD5:E622ED498F4183B776207B9896DF8C9E
SHA256:09967F191BF6FD5A675E539E608643C884176602178AAF7D481DFD681456AD01
7152WinRAR.exeC:\Users\admin\Desktop\New order.exeexecutable
MD5:0B09F5E0AD21B4E80CF4BEBD33CB6412
SHA256:4D6B690C476DBE7929D0E9C630DF8374186B1B9E357F50F04494DB556FB857D8
5964csc.exeC:\Users\admin\AppData\Local\Temp\jbg4fjco.dllexecutable
MD5:607781EACCAACA90C0C5BC949D678436
SHA256:1B8A7B7E137DD9F2EFFC31FC51B5CBD3140D7F9402797E35DA3430E42453C4F4
4244vbc.exeC:\Users\admin\AppData\Roaming\F3F363\3C28B3.lckbinary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
5964csc.exeC:\Users\admin\AppData\Local\Temp\jbg4fjco.outtext
MD5:A0D034AE904FB8F84CD3DDFF240AF24F
SHA256:380AA9982317862A621D2E129B1A55B0A06CB09681578B925329D459BACB8148
4244vbc.exeC:\Users\admin\AppData\Roaming\F3F363\3C28B3.hdbbinary
MD5:1013079A9BF8FFA458C230EA6AAF8A89
SHA256:1B1F3BCE8DF0FC7E33B518DAB09D09AF3680E39BCC3C760DADCC50C931007BE8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
46
DNS requests
16
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4244
vbc.exe
POST
404
49.13.77.253:80
http://oja34user.com/emma/Panel/five/fre.php
unknown
malicious
4244
vbc.exe
POST
404
49.13.77.253:80
http://oja34user.com/emma/Panel/five/fre.php
unknown
malicious
4244
vbc.exe
POST
404
49.13.77.253:80
http://oja34user.com/emma/Panel/five/fre.php
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2112
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4244
vbc.exe
49.13.77.253:80
oja34user.com
Hetzner Online GmbH
DE
malicious
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
3100
SIHClient.exe
20.109.210.53:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3100
SIHClient.exe
52.165.164.15:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6132
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
google.com
  • 172.217.23.110
whitelisted
oja34user.com
  • 49.13.77.253
malicious
client.wns.windows.com
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
  • 2a01:111:f100:9001::1761:914d
whitelisted
15.164.165.52.in-addr.arpa
unknown
d.4.1.9.1.6.7.1.0.0.0.0.0.0.0.0.1.0.0.9.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa
unknown
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
4244
vbc.exe
Malware Command and Control Activity Detected
ET MALWARE LokiBot Checkin
4244
vbc.exe
A Network Trojan was detected
ET MALWARE LokiBot User-Agent (Charon/Inferno)
4244
vbc.exe
Malware Command and Control Activity Detected
ET MALWARE LokiBot Checkin
4244
vbc.exe
A Network Trojan was detected
ET MALWARE LokiBot User-Agent (Charon/Inferno)
4244
vbc.exe
A Network Trojan was detected
ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
4244
vbc.exe
A Network Trojan was detected
ET MALWARE LokiBot User-Agent (Charon/Inferno)
4244
vbc.exe
Malware Command and Control Activity Detected
ET MALWARE LokiBot Checkin
4244
vbc.exe
Malware Command and Control Activity Detected
ET MALWARE LokiBot Request for C2 Commands Detected M2
4244
vbc.exe
Malware Command and Control Activity Detected
ET MALWARE LokiBot Request for C2 Commands Detected M1
4244
vbc.exe
A Network Trojan was detected
ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
No debug info