analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

010335746363544pdf (1).gz

Full analysis: https://app.any.run/tasks/c7cf04c5-7502-491f-ab40-f5dc1a4d5a08
Verdict: Malicious activity
Threats:

LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals.

Analysis date: April 15, 2019, 06:57:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
lokibot
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

DE62D2B360502B515DFDED6B5468FC6F

SHA1:

1AC97D0B8A94CB468F1981C83E235C15DEB19960

SHA256:

CAF62575B772916A7680719730CFA52E396F22EB898D07200A89D68F6E41DE08

SSDEEP:

3072:TkZUjYwM7gbyseUgxapMxj3vbMc5IGiSwbZmhOqBpdcvz:TkZQA7gbnUnMc5jidfqBLsz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • vbc.exe (PID: 3472)
      • 010335746363544pdf.exe (PID: 3184)
      • 010335746363544pdf.exe (PID: 2544)
      • vbc.exe (PID: 1880)
      • vbc.exe (PID: 3156)
      • 010335746363544pdf.exe (PID: 2256)
    • Detected artifacts of LokiBot

      • vbc.exe (PID: 3472)
    • Actions looks like stealing of personal data

      • vbc.exe (PID: 3472)
  • SUSPICIOUS

    • Executes scripts

      • 010335746363544pdf.exe (PID: 2544)
      • 010335746363544pdf.exe (PID: 3184)
      • 010335746363544pdf.exe (PID: 2256)
    • Executable content was dropped or overwritten

      • vbc.exe (PID: 3472)
      • WinRAR.exe (PID: 2696)
    • Loads DLL from Mozilla Firefox

      • vbc.exe (PID: 3472)
    • Creates files in the user directory

      • vbc.exe (PID: 3472)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
7
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start start winrar.exe 010335746363544pdf.exe no specs #LOKIBOT vbc.exe 010335746363544pdf.exe no specs vbc.exe no specs 010335746363544pdf.exe no specs vbc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2696"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\010335746363544pdf (1).gz.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
2544"C:\Users\admin\AppData\Local\Temp\Rar$EXa2696.49689\010335746363544pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2696.49689\010335746363544pdf.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Interface
Exit code:
0
3472"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
010335746363544pdf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual Basic Command Line Compiler
Version:
8.0.50727.5420
3184"C:\Users\admin\AppData\Local\Temp\Rar$EXa2696.2258\010335746363544pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2696.2258\010335746363544pdf.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Interface
Exit code:
0
1880"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe010335746363544pdf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual Basic Command Line Compiler
Exit code:
0
Version:
8.0.50727.5420
2256"C:\Users\admin\AppData\Local\Temp\Rar$EXa2696.4577\010335746363544pdf.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2696.4577\010335746363544pdf.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Interface
Exit code:
0
3156"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe010335746363544pdf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual Basic Command Line Compiler
Exit code:
0
Version:
8.0.50727.5420
Total events
464
Read events
451
Write events
13
Delete events
0

Modification events

(PID) Process:(2696) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2696) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2696) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2696) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\010335746363544pdf (1).gz.rar
(PID) Process:(2696) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2696) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2696) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2696) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2696) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2696) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
4
Suspicious files
0
Text files
0
Unknown types
2

Dropped files

PID
Process
Filename
Type
3472vbc.exeC:\Users\admin\AppData\Roaming\F63AAA\A71D80.lck
MD5:
SHA256:
2696WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2696.49689\010335746363544pdf.exeexecutable
MD5:323A6902127C72A1A0C05FAD12706779
SHA256:45BDA08CEDFEAE2012BFCEF1554A8209762DEE8E17CFE9905EFDDA6C04544E72
2696WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2696.4577\010335746363544pdf.exeexecutable
MD5:323A6902127C72A1A0C05FAD12706779
SHA256:45BDA08CEDFEAE2012BFCEF1554A8209762DEE8E17CFE9905EFDDA6C04544E72
2696WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa2696.2258\010335746363544pdf.exeexecutable
MD5:323A6902127C72A1A0C05FAD12706779
SHA256:45BDA08CEDFEAE2012BFCEF1554A8209762DEE8E17CFE9905EFDDA6C04544E72
3472vbc.exeC:\Users\admin\AppData\Roaming\F63AAA\A71D80.exeexecutable
MD5:34AA912DEFA18C2C129F1E09D75C1D7E
SHA256:6DF94B7FA33F1B87142ADC39B3DB0613FC520D9E7A5FD6A5301DD7F51F8D0386
3472vbc.exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1302019708-1500728564-335382590-1000\0f5007522459c86e95ffcc62f32308f1_90059c37-1320-41a4-b58d-2b75a9850d2fdbf
MD5:18B8CFC0185C50383AAC0A4F30A9DAC8
SHA256:913E8CED6A447FE791954D382ABA52D490513C5D2F689B391866C7E561F89A03
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

Domain
IP
Reputation
shakealars3.com
malicious

Threats

No threats detected
No debug info