File name:

2번 정보유출형 악성코드.exe

Full analysis: https://app.any.run/tasks/f128fa68-4b25-4a4b-ba12-184657d323c3
Verdict: Malicious activity
Threats:

LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals.

Analysis date: June 01, 2025, 08:52:50
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
stealer
lokibot
trojan
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

EF3E237FD29BCA76569172FDD5DE561F

SHA1:

C8553106922F0F27A908ACEA58AD764300799C54

SHA256:

C37A39C363FF60B81D35B8F0B3A6BA9B56E145C886393E50085B32A136DFBF94

SSDEEP:

3072:PV1E4A9cWB6xRdPftMwOUnkjE0+uiiUGg:PV1E4YcWB6xRZfLnkjE0miUJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • 2번 정보유출형 악성코드.exe (PID: 3500)
    • Actions looks like stealing of personal data

      • 2번 정보유출형 악성코드.exe (PID: 3500)
    • Lokibot is detected

      • 2번 정보유출형 악성코드.exe (PID: 3500)
      • 2번 정보유출형 악성코드.exe (PID: 3500)
    • LOKIBOT has been detected (SURICATA)

      • 2번 정보유출형 악성코드.exe (PID: 3500)
    • LOKIBOT has been detected (YARA)

      • 2번 정보유출형 악성코드.exe (PID: 3500)
    • Connects to the CnC server

      • 2번 정보유출형 악성코드.exe (PID: 3500)
  • SUSPICIOUS

    • Reads Mozilla Firefox installation path

      • 2번 정보유출형 악성코드.exe (PID: 3500)
    • Loads DLL from Mozilla Firefox

      • 2번 정보유출형 악성코드.exe (PID: 3500)
    • Reads the Internet Settings

      • 2번 정보유출형 악성코드.exe (PID: 3500)
    • Accesses Microsoft Outlook profiles

      • 2번 정보유출형 악성코드.exe (PID: 3500)
    • Executable content was dropped or overwritten

      • 2번 정보유출형 악성코드.exe (PID: 3500)
    • Contacting a server suspected of hosting an CnC

      • 2번 정보유출형 악성코드.exe (PID: 3500)
  • INFO

    • Reads the machine GUID from the registry

      • 2번 정보유출형 악성코드.exe (PID: 3500)
    • Checks supported languages

      • 2번 정보유출형 악성코드.exe (PID: 3500)
    • Reads the computer name

      • 2번 정보유출형 악성코드.exe (PID: 3500)
    • Creates files or folders in the user directory

      • 2번 정보유출형 악성코드.exe (PID: 3500)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:06:23 16:04:21+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 79872
InitializedDataSize: 565760
UninitializedDataSize: -
EntryPoint: 0x139de
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
32
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #LOKIBOT 2번 정보유출형 악성코드.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
1080C:\Windows\system32\svchost.exe -k NetworkServiceC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3500"C:\Users\admin\AppData\Local\Temp\2번 정보유출형 악성코드.exe" C:\Users\admin\AppData\Local\Temp\2번 정보유출형 악성코드.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\2번 정보유출형 악성코드.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
Total events
1 028
Read events
1 021
Write events
7
Delete events
0

Modification events

(PID) Process:(1080) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Nla\Cache\Intranet
Operation:writeName:{4040CF00-1B3E-486A-B407-FA14C56B6FC0}
Value:
D4DA6D630353
(PID) Process:(3500) 2번 정보유출형 악성코드.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3500) 2번 정보유출형 악성코드.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3500) 2번 정보유출형 악성코드.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3500) 2번 정보유출형 악성코드.exeKey:HKEY_CURRENT_USER\������Ў�������я�Ћ����Я����Й��я��
Operation:writeName:F63AAA
Value:
%APPDATA%\F63AAA\A71D80.exe
Executable files
1
Suspicious files
3
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
35002번 정보유출형 악성코드.exeC:\Users\admin\AppData\Roaming\F63AAA\A71D80.exeexecutable
MD5:EF3E237FD29BCA76569172FDD5DE561F
SHA256:C37A39C363FF60B81D35B8F0B3A6BA9B56E145C886393E50085B32A136DFBF94
35002번 정보유출형 악성코드.exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1302019708-1500728564-335382590-1000\0f5007522459c86e95ffcc62f32308f1_90059c37-1320-41a4-b58d-2b75a9850d2fbinary
MD5:D898504A722BFF1524134C6AB6A5EAA5
SHA256:878F32F76B159494F5A39F9321616C6068CDB82E88DF89BCC739BBC1EA78E1F9
35002번 정보유출형 악성코드.exeC:\Users\admin\AppData\Roaming\F63AAA\A71D80.lckbinary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
35002번 정보유출형 악성코드.exeC:\Users\admin\AppData\Roaming\F63AAA\A71D80.hdbtext
MD5:A8B1CC99472D963E363C160997C7F55D
SHA256:924B9DE4D2A615AF21692E3F6A69B01B7CD0FF48CD5F40079D5D8C8F87038434
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
9
DNS requests
3
Threats
15

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3500
2번 정보유출형 악성코드.exe
POST
404
49.13.77.253:80
http://quehosts.pw/teuro/Panel/fre.php
unknown
malicious
3500
2번 정보유출형 악성코드.exe
POST
404
49.13.77.253:80
http://quehosts.pw/teuro/Panel/fre.php
unknown
malicious
3500
2번 정보유출형 악성코드.exe
POST
404
49.13.77.253:80
http://quehosts.pw/teuro/Panel/fre.php
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted
3500
2번 정보유출형 악성코드.exe
49.13.77.253:80
quehosts.pw
Hetzner Online GmbH
DE
malicious

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.181.238
whitelisted
quehosts.pw
  • 49.13.77.253
malicious

Threats

PID
Process
Class
Message
1080
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.pw domain - Likely Hostile
1080
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.pw domain - Likely Hostile
3500
2번 정보유출형 악성코드.exe
Misc activity
ET INFO HTTP Request to a *.pw domain
3500
2번 정보유출형 악성코드.exe
A Network Trojan was detected
ET MALWARE LokiBot User-Agent (Charon/Inferno)
3500
2번 정보유출형 악성코드.exe
A Network Trojan was detected
ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
3500
2번 정보유출형 악성코드.exe
Malware Command and Control Activity Detected
ET MALWARE LokiBot Checkin
3500
2번 정보유출형 악성코드.exe
Misc activity
ET INFO HTTP Request to a *.pw domain
3500
2번 정보유출형 악성코드.exe
Misc activity
ET INFO HTTP Request to a *.pw domain
3500
2번 정보유출형 악성코드.exe
A Network Trojan was detected
ET MALWARE LokiBot User-Agent (Charon/Inferno)
3500
2번 정보유출형 악성코드.exe
A Network Trojan was detected
ET MALWARE LokiBot User-Agent (Charon/Inferno)
No debug info