File name: | packing list & BL shipping document.ace |
Full analysis: | https://app.any.run/tasks/b0d320fa-79a9-41d3-af94-c574d0ee1b83 |
Verdict: | Malicious activity |
Threats: | LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals. |
Analysis date: | November 15, 2018, 07:57:35 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/octet-stream |
File info: | ACE archive data version 20, from Win/32, version 20 to extract, solid |
MD5: | 97606C54C896F88C7CCD2A21AA531418 |
SHA1: | B8C9A9002C9DAD071BC09BE842F36D1935CE6CD2 |
SHA256: | D42AA3AC80F9C88BC2ED8E211EDFDB1FF58BB60EA5AF9C147126E50F7E7DB92F |
SSDEEP: | 6144:x7PINEP//B0Gp8CQQTeWAGWgmUjYLaJLfr:x7P7P/ugQaeWxWgFYL6r |
.ace | | | ACE compressed archive (100) |
---|
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3576 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\packing list & BL shipping document.ace" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 | ||||
3932 | "C:\Users\admin\Desktop\Sample item & PO4829831796 design.exe" | C:\Users\admin\Desktop\Sample item & PO4829831796 design.exe | explorer.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
328 | "C:\Users\admin\Desktop\Sample item & PO4829831796 design.exe" | C:\Users\admin\Desktop\Sample item & PO4829831796 design.exe | Sample item & PO4829831796 design.exe | |
User: admin Integrity Level: MEDIUM |
PID | Process | Filename | Type | |
---|---|---|---|---|
3932 | Sample item & PO4829831796 design.exe | C:\Users\admin\AppData\Local\Temp\beeeaters.dll | executable | |
MD5:694748B0594AF99B9AA1FB096BCC1150 | SHA256:FE6179A9F337FAB0CBFDBD5F17A58A9F517E2CAED5AE1CE068AC1DAA9891853D | |||
3932 | Sample item & PO4829831796 design.exe | C:\Users\admin\AppData\Local\Temp\Subabbot | binary | |
MD5:7A112477896BE2C7E11720E5899DE96E | SHA256:804BB0FB53FBEB43968C9F7D273368A483A117F504A216480CB44A4291482828 | |||
3576 | WinRAR.exe | C:\Users\admin\Desktop\Sample item & PO4829831796 design.exe | executable | |
MD5:09C7B5CC44FDE379BDDF1A644B145F86 | SHA256:4EE44B9DB096AC5FDA403481291A6BB1F34349C171C4D654B59D3EA30620BF8B | |||
3932 | Sample item & PO4829831796 design.exe | C:\Users\admin\AppData\Local\Temp\nsfE144.tmp\System.dll | executable | |
MD5:75ED96254FBF894E42058062B4B4F0D1 | SHA256:A632D74332B3F08F834C732A103DAFEB09A540823A2217CA7F49159755E8F1D7 | |||
3932 | Sample item & PO4829831796 design.exe | C:\Users\admin\AppData\Local\Temp\made.rtf | text | |
MD5:8274425DE767B30B2FFF1124AB54ABB5 | SHA256:0D6AFB7E939F0936F40AFDC759B5A354EA5427EC250A47E7B904AB1EA800A01D |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
328 | Sample item & PO4829831796 design.exe | POST | — | 185.246.153.35:80 | http://mamujeeproduct.com/nk/encode.php | unknown | — | — | malicious |
328 | Sample item & PO4829831796 design.exe | POST | 404 | 185.246.153.35:80 | http://mamujeeproduct.com/nk/encode.php | unknown | binary | 23 b | malicious |
— | — | POST | 404 | 94.103.80.209:80 | http://mamujeeproduct.com/nk/encode.php | RU | binary | 23 b | malicious |
328 | Sample item & PO4829831796 design.exe | POST | 404 | 185.246.153.35:80 | http://mamujeeproduct.com/nk/encode.php | unknown | text | 15 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
— | — | 94.103.80.209:80 | mamujeeproduct.com | Webzilla B.V. | RU | malicious |
328 | Sample item & PO4829831796 design.exe | 185.246.153.35:80 | mamujeeproduct.com | — | — | malicious |
Domain | IP | Reputation |
---|---|---|
mamujeeproduct.com |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
328 | Sample item & PO4829831796 design.exe | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
328 | Sample item & PO4829831796 design.exe | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
328 | Sample item & PO4829831796 design.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 |
328 | Sample item & PO4829831796 design.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 |
328 | Sample item & PO4829831796 design.exe | A Network Trojan was detected | MALWARE [PTsecurity] Loki Bot Check-in M2 |
328 | Sample item & PO4829831796 design.exe | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
328 | Sample item & PO4829831796 design.exe | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
328 | Sample item & PO4829831796 design.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 |
328 | Sample item & PO4829831796 design.exe | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 |
328 | Sample item & PO4829831796 design.exe | A Network Trojan was detected | MALWARE [PTsecurity] Loki Bot Check-in M2 |