File name: | e712c548f77200b824c83a643a53abfe5beb5cd88374ae4242c5ecff31e0789a |
Full analysis: | https://app.any.run/tasks/64a1ce28-f6e4-4eea-8435-09efdab41ce7 |
Verdict: | Malicious activity |
Threats: | LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals. |
Analysis date: | March 21, 2019, 14:58:36 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | text/rtf |
File info: | Rich Text Format data, version 1, unknown character set |
MD5: | D34869B18C1EC994AB1B7A0970A402D7 |
SHA1: | B69CF2698920633C03ED086D08E60DFE6682137A |
SHA256: | E712C548F77200B824C83A643A53ABFE5BEB5CD88374AE4242C5ECFF31E0789A |
SSDEEP: | 12288:s6flgbggmfTpCugpYkuE1jXK+ofFy+SBALAdk/E084XoU3YmHZ+rxgmXVr6FWlpr:lH5yQs08gIHgozlwALTusH0BNmQW |
.rtf | | | Rich Text Format (100) |
---|
InternalVersionNumber: | 57435 |
---|---|
CharactersWithSpaces: | 27 |
Characters: | 24 |
Words: | 4 |
Pages: | 1 |
TotalEditTime: | 1 minute |
RevisionNumber: | 3 |
ModifyDate: | 2019:01:03 16:34:00 |
CreateDate: | 2019:01:03 16:14:00 |
LastModifiedBy: | wuyan |
Author: | wuyan |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2384 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\e712c548f77200b824c83a643a53abfe5beb5cd88374ae4242c5ecff31e0789a.rtf" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3544 | "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding | C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE | svchost.exe | |
User: admin Company: Design Science, Inc. Integrity Level: MEDIUM Description: Microsoft Equation Editor Exit code: 0 Version: 00110900 | ||||
124 | cmd /c %tMp%\~.t | C:\Windows\system32\cmd.exe | — | EQNEDT32.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 3221225477 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
828 | C:\Users\admin\AppData\Local\Temp\~.t | C:\Users\admin\AppData\Local\Temp\~.t | cmd.exe | |
User: admin Company: Sergey Serkov Integrity Level: MEDIUM Description: Ill Meaningfully Exit code: 3221225477 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2384 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR8A07.tmp.cvr | — | |
MD5:— | SHA256:— | |||
828 | ~.t | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.lck | — | |
MD5:— | SHA256:— | |||
2384 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$12c548f77200b824c83a643a53abfe5beb5cd88374ae4242c5ecff31e0789a.rtf | pgc | |
MD5:A9DE0C48461C2B127ADC2A810585AD26 | SHA256:93FCAC33616C3BEE9C866689B6C2ED5E632962C1974695FD98CA818F7EF19985 | |||
2384 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A57969AC.emf | emf | |
MD5:044015C97A3207E092721FA1BE8296DD | SHA256:6C9A096C493262F7671664966F9880E0A2212242C9826E1791477FC94E004880 | |||
2384 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:E578D985DA531A6D7F6D1DA418711FA8 | SHA256:C2D03ADCF7BB145C996382659BBFEBEF78A6B9ADC2BA93200EBC7E86E3989FB3 | |||
828 | ~.t | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.exe | executable | |
MD5:B173593660EB4CC011D3913812366D58 | SHA256:D2E6D66C92F0FFABF5341FFAC37CE307745B9E123361C2BE78D99C94E68E8685 | |||
2384 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~.t | executable | |
MD5:B173593660EB4CC011D3913812366D58 | SHA256:D2E6D66C92F0FFABF5341FFAC37CE307745B9E123361C2BE78D99C94E68E8685 | |||
828 | ~.t | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.hdb | text | |
MD5:5302B1B5EC232D44E2D9507FB847FC49 | SHA256:20B58A25872B1E3F7D47DAE0C090ACF229C49B6E33939934513499CC37BB2684 | |||
828 | ~.t | C:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1302019708-1500728564-335382590-1000\0f5007522459c86e95ffcc62f32308f1_90059c37-1320-41a4-b58d-2b75a9850d2f | dbf | |
MD5:18B8CFC0185C50383AAC0A4F30A9DAC8 | SHA256:913E8CED6A447FE791954D382ABA52D490513C5D2F689B391866C7E561F89A03 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
828 | ~.t | POST | 302 | 217.174.152.36:80 | http://armanifile.co.uk/zp/fre.php | BG | html | 233 b | malicious |
828 | ~.t | POST | 302 | 217.174.152.36:80 | http://armanifile.co.uk/zp/fre.php | BG | html | 233 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
828 | ~.t | 217.174.152.36:80 | armanifile.co.uk | NetInfo.BG JSCo | BG | malicious |
Domain | IP | Reputation |
---|---|---|
armanifile.co.uk |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
828 | ~.t | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
828 | ~.t | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
828 | ~.t | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 |
828 | ~.t | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 |
828 | ~.t | A Network Trojan was detected | MALWARE [PTsecurity] Loki Bot Check-in M2 |
828 | ~.t | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
828 | ~.t | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
828 | ~.t | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 |
828 | ~.t | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 |
828 | ~.t | A Network Trojan was detected | MALWARE [PTsecurity] Loki Bot Check-in M2 |