File name: | sample08.eml |
Full analysis: | https://app.any.run/tasks/93827da4-0972-4928-a9c2-9947cf9d7c76 |
Verdict: | Malicious activity |
Threats: | LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals. |
Analysis date: | July 17, 2019, 14:07:46 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | text/plain |
File info: | ASCII text, with CRLF line terminators |
MD5: | EBD24B94907766D100961969CD33B362 |
SHA1: | C6F322C5BB579547274E49454989BA01241E8C91 |
SHA256: | A89435E86E7A50F5B6363B1EDAD0A5998C80A499C820802247AAA6EB22D68530 |
SSDEEP: | 6144:BEvLUMPzZDZt5KcP8R2pO5Ib0VpDjVqdG:Svo8m2pYVVp/VqdG |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3696 | "C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\sample08.eml" | C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Outlook Exit code: 0 Version: 14.0.6025.1000 | ||||
3984 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\X7F1AA64\M0009_78883_PDF (1).arj" | C:\Program Files\WinRAR\WinRAR.exe | OUTLOOK.EXE | |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 | ||||
2852 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa3984.235\M0009_78883_PDF.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa3984.235\M0009_78883_PDF.exe | — | WinRAR.exe |
User: admin Integrity Level: MEDIUM Description: CollapseDotate Exit code: 0 Version: 5.06.0001 | ||||
2124 | C:\Users\admin\AppData\Local\Temp\Rar$EXa3984.235\M0009_78883_PDF.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa3984.235\M0009_78883_PDF.exe | M0009_78883_PDF.exe | |
User: admin Integrity Level: MEDIUM Description: CollapseDotate Version: 5.06.0001 | ||||
2164 | "C:\Users\admin\Desktop\M0009_78883_PDF.exe" | C:\Users\admin\Desktop\M0009_78883_PDF.exe | — | explorer.exe |
User: admin Integrity Level: MEDIUM Description: CollapseDotate Exit code: 0 Version: 5.06.0001 | ||||
3292 | C:\Users\admin\Desktop\M0009_78883_PDF.exe" | C:\Users\admin\Desktop\M0009_78883_PDF.exe | — | M0009_78883_PDF.exe |
User: admin Integrity Level: MEDIUM Description: CollapseDotate Exit code: 0 Version: 5.06.0001 | ||||
3876 | "C:\Program Files\Google\Chrome\Application\chrome.exe" | C:\Program Files\Google\Chrome\Application\chrome.exe | explorer.exe | |
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Version: 75.0.3770.100 | ||||
3000 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x722aa9d0,0x722aa9e0,0x722aa9ec | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Version: 75.0.3770.100 | ||||
1456 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2764 --on-initialized-event-handle=312 --parent-handle=316 /prefetch:6 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Version: 75.0.3770.100 | ||||
3332 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1008,8160022575539042577,11219179345153762060,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=15041754421402219813 --mojo-platform-channel-handle=1024 --ignored=" --type=renderer " /prefetch:2 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Version: 75.0.3770.100 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3696 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\CVRD002.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3696 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Temp\tmpD1E7.tmp | — | |
MD5:— | SHA256:— | |||
3696 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\X7F1AA64\M0009_78883_PDF (1) (2).arj\:Zone.Identifier:$DATA | — | |
MD5:— | SHA256:— | |||
2124 | M0009_78883_PDF.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.lck | — | |
MD5:— | SHA256:— | |||
3696 | OUTLOOK.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotm | pgc | |
MD5:23B54663F303979D81FA962B7FFBF0BA | SHA256:969F41B5A26566AC960C73C17D0D5D77A22425967A271A695C111C10AE380068 | |||
3696 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\X7F1AA64\M0009_78883_PDF (1).arj | compressed | |
MD5:F9F96984F7B9F5E604D8443AA53A0A59 | SHA256:2CE8D16FCD210CFBC7EA9B5CC79947BC6671BA44FE3D74974E1716585CB8C8AE | |||
2124 | M0009_78883_PDF.exe | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.hdb | text | |
MD5:5302B1B5EC232D44E2D9507FB847FC49 | SHA256:20B58A25872B1E3F7D47DAE0C090ACF229C49B6E33939934513499CC37BB2684 | |||
3696 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{19C1768D-4FDE-40CC-AAC1-AEF3BBC322D0}.tmp | — | |
MD5:— | SHA256:— | |||
2852 | M0009_78883_PDF.exe | C:\Users\admin\AppData\Local\Temp\~DF97DBDC6FD51621C2.TMP | binary | |
MD5:5386838CF45B0C89E2126DD121296862 | SHA256:C4DA119134E9C7472007907F529F28FF48185BD4FBC216A0EF86C7C7534DAFB5 | |||
3696 | OUTLOOK.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\X7F1AA64\M0009_78883_PDF (1) (2).arj | compressed | |
MD5:F9F96984F7B9F5E604D8443AA53A0A59 | SHA256:2CE8D16FCD210CFBC7EA9B5CC79947BC6671BA44FE3D74974E1716585CB8C8AE |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3620 | chrome.exe | GET | 200 | 212.109.219.127:80 | http://suksez-ab.com/ | RU | html | 548 b | malicious |
3620 | chrome.exe | GET | 302 | 216.58.208.46:80 | http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx | US | html | 514 b | whitelisted |
3620 | chrome.exe | GET | 200 | 74.125.8.60:80 | http://r6---sn-5hne6n7z.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx?cms_redirect=yes&mip=85.203.44.113&mm=28&mn=sn-5hne6n7z&ms=nvh&mt=1563372566&mv=m&mvi=5&pl=24&shardbypass=yes | US | crx | 862 Kb | whitelisted |
2124 | M0009_78883_PDF.exe | POST | 404 | 45.86.180.161:80 | http://suksez-ab.com/click/five/fre.php | unknown | binary | 23 b | malicious |
2124 | M0009_78883_PDF.exe | POST | 404 | 45.86.180.161:80 | http://suksez-ab.com/click/five/fre.php | unknown | text | 15 b | malicious |
2124 | M0009_78883_PDF.exe | POST | 404 | 45.86.180.161:80 | http://suksez-ab.com/click/five/fre.php | unknown | text | 15 b | malicious |
3620 | chrome.exe | GET | 404 | 212.109.219.127:80 | http://suksez-ab.com/favicon.ico | RU | html | 209 b | malicious |
2124 | M0009_78883_PDF.exe | POST | 404 | 212.109.219.127:80 | http://suksez-ab.com/click/five/fre.php | RU | binary | 23 b | malicious |
3620 | chrome.exe | GET | 403 | 45.86.180.161:80 | http://45.86.180.161/ | unknown | html | 564 b | malicious |
2124 | M0009_78883_PDF.exe | POST | 404 | 194.67.196.214:80 | http://suksez-ab.com/click/five/fre.php | RU | binary | 23 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2124 | M0009_78883_PDF.exe | 45.86.180.161:80 | suksez-ab.com | — | — | malicious |
3620 | chrome.exe | 172.217.18.3:443 | www.gstatic.com | Google Inc. | US | whitelisted |
3620 | chrome.exe | 172.217.18.163:443 | www.google.com.ua | Google Inc. | US | whitelisted |
3620 | chrome.exe | 172.217.22.106:443 | fonts.googleapis.com | Google Inc. | US | whitelisted |
3696 | OUTLOOK.EXE | 64.4.26.155:80 | config.messenger.msn.com | Microsoft Corporation | US | whitelisted |
3620 | chrome.exe | 216.58.207.35:443 | clientservices.googleapis.com | Google Inc. | US | whitelisted |
3620 | chrome.exe | 172.217.22.109:443 | accounts.google.com | Google Inc. | US | whitelisted |
3620 | chrome.exe | 172.217.23.142:443 | apis.google.com | Google Inc. | US | whitelisted |
3620 | chrome.exe | 172.217.16.168:443 | ssl.google-analytics.com | Google Inc. | US | whitelisted |
— | — | 216.58.205.227:443 | ssl.gstatic.com | Google Inc. | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
config.messenger.msn.com |
| whitelisted |
dns.msftncsi.com |
| shared |
suksez-ab.com |
| malicious |
clientservices.googleapis.com |
| whitelisted |
accounts.google.com |
| shared |
www.google.com.ua |
| whitelisted |
fonts.googleapis.com |
| whitelisted |
www.gstatic.com |
| whitelisted |
fonts.gstatic.com |
| whitelisted |
apis.google.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
2124 | M0009_78883_PDF.exe | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
2124 | M0009_78883_PDF.exe | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
2124 | M0009_78883_PDF.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 |
2124 | M0009_78883_PDF.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 |
2124 | M0009_78883_PDF.exe | A Network Trojan was detected | MALWARE [PTsecurity] Loki Bot Check-in M2 |
2124 | M0009_78883_PDF.exe | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
2124 | M0009_78883_PDF.exe | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
2124 | M0009_78883_PDF.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 |
2124 | M0009_78883_PDF.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 |
2124 | M0009_78883_PDF.exe | A Network Trojan was detected | MALWARE [PTsecurity] Loki Bot Check-in M2 |