analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

New order#0093200.ace

Full analysis: https://app.any.run/tasks/fbba09a6-f7dd-4660-be8c-2ec98c5f70ae
Verdict: Malicious activity
Threats:

LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals.

Analysis date: January 22, 2019, 21:19:37
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
lokibot
Indicators:
MIME: application/octet-stream
File info: ACE archive data version 20, from Win/32, version 20 to extract, solid
MD5:

45F84A3212DAA421E66670F88508BCAD

SHA1:

F4C31BD3C22E1708C316586D940B608A5F6A3913

SHA256:

AB49E35BF7B484958EA8104B3F348C160554824136C213539D22DB4DFC400A11

SSDEEP:

6144:H/uGFQnV8x9/Bi9hiLbdkRVFIB3SBISH/euMZ:H/udn4+RQBCBPGjZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • New order#0093200.exe (PID: 2736)
    • Application was dropped or rewritten from another process

      • New order#0093200.exe (PID: 2736)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • New order#0093200.exe (PID: 2736)
      • WinRAR.exe (PID: 2976)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.ace | ACE compressed archive (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
31
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start winrar.exe new order#0093200.exe

Process information

PID
CMD
Path
Indicators
Parent process
2976"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\New order#0093200.ace"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2736"C:\Users\admin\AppData\Local\Temp\Rar$EXa2976.847\New order#0093200.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2976.847\New order#0093200.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Total events
812
Read events
773
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2976WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2976.847\New order#0093200.exeexecutable
MD5:17CC710C4892944BE52CAB3943695324
SHA256:3FF07CF495A252567F937FF245DAF4DFA1CB82CABE039017430A5B963EDC6242
2736New order#0093200.exeC:\Users\admin\AppData\Local\Temp\nssA123.tmp\InstallOptions.dllexecutable
MD5:8D5A5529462A9BA1AC068EE0502578C7
SHA256:E625DCD0188594B1289891B64DEBDDEB5159ACA182B83A12675427B320BF7790
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
4
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
POST
404
193.238.47.115:80
http://ivytechbulk.com/atoz/encode.php
unknown
text
15 b
malicious
POST
404
193.238.47.115:80
http://ivytechbulk.com/atoz/encode.php
unknown
binary
23 b
malicious
POST
404
193.238.47.115:80
http://ivytechbulk.com/atoz/encode.php
unknown
binary
23 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
193.238.47.115:80
ivytechbulk.com
malicious

DNS requests

Domain
IP
Reputation
ivytechbulk.com
  • 193.238.47.115
malicious

Threats

PID
Process
Class
Message
A Network Trojan was detected
ET TROJAN LokiBot User-Agent (Charon/Inferno)
A Network Trojan was detected
ET TROJAN LokiBot Checkin
A Network Trojan was detected
ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1
A Network Trojan was detected
ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2
A Network Trojan was detected
MALWARE [PTsecurity] Loki Bot Check-in M2
A Network Trojan was detected
ET TROJAN LokiBot User-Agent (Charon/Inferno)
A Network Trojan was detected
ET TROJAN LokiBot Checkin
A Network Trojan was detected
ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1
A Network Trojan was detected
ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2
A Network Trojan was detected
MALWARE [PTsecurity] Loki Bot Check-in M2
No debug info