File name:

1fe6daa6f0c080dcb7fe23a24e2fd627.exe

Full analysis: https://app.any.run/tasks/a95d6dee-6d1b-4b46-8cc3-1e8c888b64d2
Verdict: Malicious activity
Threats:

LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals.

Analysis date: December 02, 2023, 16:50:23
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
trojan
lokibot
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

1FE6DAA6F0C080DCB7FE23A24E2FD627

SHA1:

69EEA166D5FD4EF7141AC3EF12B458E83DE34B2D

SHA256:

A0D98962965A9D319AA298F072DBACFD5152F3A73D707FA51C9AA9852592607D

SSDEEP:

6144:2ZCY0SgBY5XLmKVrlHWdtDfYqg0yjgfeDim38zYkqzKXTg5lVVVVV3jX:2ZCY5rrl2dtD/DM5lVVVVVj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • 1fe6daa6f0c080dcb7fe23a24e2fd627.exe (PID: 2604)
    • Drops the executable file immediately after the start

      • 1fe6daa6f0c080dcb7fe23a24e2fd627.exe (PID: 2604)
    • LOKIBOT has been detected (YARA)

      • 1fe6daa6f0c080dcb7fe23a24e2fd627.exe (PID: 2604)
    • Lokibot is detected

      • 1fe6daa6f0c080dcb7fe23a24e2fd627.exe (PID: 2604)
    • Connects to the CnC server

      • 1fe6daa6f0c080dcb7fe23a24e2fd627.exe (PID: 2604)
    • Actions looks like stealing of personal data

      • 1fe6daa6f0c080dcb7fe23a24e2fd627.exe (PID: 2604)
  • SUSPICIOUS

    • Reads the Internet Settings

      • 1fe6daa6f0c080dcb7fe23a24e2fd627.exe (PID: 2604)
    • Accesses Microsoft Outlook profiles

      • 1fe6daa6f0c080dcb7fe23a24e2fd627.exe (PID: 2604)
  • INFO

    • Reads the machine GUID from the registry

      • 1fe6daa6f0c080dcb7fe23a24e2fd627.exe (PID: 2604)
    • Reads the computer name

      • 1fe6daa6f0c080dcb7fe23a24e2fd627.exe (PID: 2604)
    • Checks supported languages

      • 1fe6daa6f0c080dcb7fe23a24e2fd627.exe (PID: 2604)
    • Creates files or folders in the user directory

      • 1fe6daa6f0c080dcb7fe23a24e2fd627.exe (PID: 2604)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

LokiBot

(PID) Process(2604) 1fe6daa6f0c080dcb7fe23a24e2fd627.exe
C2https://sempersim.su/a16/fre.php
Decoys (4)kbfvzoboss.bid/alien/fre.php
alphastand.trade/alien/fre.php
alphastand.win/alien/fre.php
alphastand.top/alien/fre.php
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (42.6)
.exe | Clipper DOS Executable (19.1)
.exe | Generic Win/DOS Executable (18.9)
.exe | DOS Executable Generic (18.9)
.vxd | VXD Driver (0.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:10:06 23:31:38+02:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 166400
InitializedDataSize: 40488448
UninitializedDataSize: -
EntryPoint: 0x3704
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 37.0.0.0
ProductVersionNumber: 46.0.0.0
FileFlagsMask: 0x145a
FileFlags: (none)
FileOS: Unknown (0x20723)
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: Unknown (0452)
CharacterSet: Unknown (30F3)
FileDescription: Mabling
LegalCopyright: Copyright (C) 2022, Crazy
OriginalFileName: Munpler
ProductsVersion: 19.3.71.61
ProductionVersion: 16.78.79.2
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
32
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #LOKIBOT 1fe6daa6f0c080dcb7fe23a24e2fd627.exe

Process information

PID
CMD
Path
Indicators
Parent process
2604"C:\Users\admin\AppData\Local\Temp\1fe6daa6f0c080dcb7fe23a24e2fd627.exe" C:\Users\admin\AppData\Local\Temp\1fe6daa6f0c080dcb7fe23a24e2fd627.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\1fe6daa6f0c080dcb7fe23a24e2fd627.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
LokiBot
(PID) Process(2604) 1fe6daa6f0c080dcb7fe23a24e2fd627.exe
C2https://sempersim.su/a16/fre.php
Decoys (4)kbfvzoboss.bid/alien/fre.php
alphastand.trade/alien/fre.php
alphastand.win/alien/fre.php
alphastand.top/alien/fre.php
Total events
1 008
Read events
1 006
Write events
2
Delete events
0

Modification events

(PID) Process:(2604) 1fe6daa6f0c080dcb7fe23a24e2fd627.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2604) 1fe6daa6f0c080dcb7fe23a24e2fd627.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
1
Suspicious files
3
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
26041fe6daa6f0c080dcb7fe23a24e2fd627.exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3896776584-4254864009-862391680-1000\0f5007522459c86e95ffcc62f32308f1_eeeb5d54-7880-42a7-b542-739bbc26cf4bbinary
MD5:D898504A722BFF1524134C6AB6A5EAA5
SHA256:878F32F76B159494F5A39F9321616C6068CDB82E88DF89BCC739BBC1EA78E1F9
26041fe6daa6f0c080dcb7fe23a24e2fd627.exeC:\Users\admin\AppData\Roaming\03B51E\EE03AE.lckbinary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
26041fe6daa6f0c080dcb7fe23a24e2fd627.exeC:\Users\admin\AppData\Roaming\03B51E\EE03AE.exeexecutable
MD5:1FE6DAA6F0C080DCB7FE23A24E2FD627
SHA256:A0D98962965A9D319AA298F072DBACFD5152F3A73D707FA51C9AA9852592607D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
10
DNS requests
1
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2604
1fe6daa6f0c080dcb7fe23a24e2fd627.exe
POST
404
104.237.252.65:80
http://sempersim.su/a16/fre.php
unknown
text
15 b
unknown
2604
1fe6daa6f0c080dcb7fe23a24e2fd627.exe
POST
404
104.237.252.65:80
http://sempersim.su/a16/fre.php
unknown
binary
23 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1956
svchost.exe
239.255.255.250:1900
whitelisted
324
svchost.exe
224.0.0.252:5355
unknown
2604
1fe6daa6f0c080dcb7fe23a24e2fd627.exe
104.237.252.65:80
sempersim.su
DEDICATED-FIBER-COMMUNICATIONS
US
unknown

DNS requests

Domain
IP
Reputation
sempersim.su
  • 104.237.252.65
unknown

Threats

PID
Process
Class
Message
324
svchost.exe
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
2604
1fe6daa6f0c080dcb7fe23a24e2fd627.exe
Malware Command and Control Activity Detected
ET MALWARE LokiBot Checkin
2604
1fe6daa6f0c080dcb7fe23a24e2fd627.exe
A Network Trojan was detected
ET MALWARE LokiBot User-Agent (Charon/Inferno)
2604
1fe6daa6f0c080dcb7fe23a24e2fd627.exe
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
2604
1fe6daa6f0c080dcb7fe23a24e2fd627.exe
A Network Trojan was detected
ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
2604
1fe6daa6f0c080dcb7fe23a24e2fd627.exe
A Network Trojan was detected
ET MALWARE LokiBot User-Agent (Charon/Inferno)
2604
1fe6daa6f0c080dcb7fe23a24e2fd627.exe
Malware Command and Control Activity Detected
ET MALWARE LokiBot Checkin
2604
1fe6daa6f0c080dcb7fe23a24e2fd627.exe
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
2604
1fe6daa6f0c080dcb7fe23a24e2fd627.exe
Malware Command and Control Activity Detected
ET MALWARE LokiBot Request for C2 Commands Detected M1
2604
1fe6daa6f0c080dcb7fe23a24e2fd627.exe
A Network Trojan was detected
ET MALWARE LokiBot Fake 404 Response
2 ETPRO signatures available at the full report
No debug info