File name: | e712c548f77200b824c83a643a53abfe5beb5cd88374ae4242c5ecff31e0789a.doc |
Full analysis: | https://app.any.run/tasks/ad2bc487-e501-4adf-9ef2-8c14ac2c6fbd |
Verdict: | Malicious activity |
Threats: | LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals. |
Analysis date: | March 21, 2019, 01:12:42 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | text/rtf |
File info: | Rich Text Format data, version 1, unknown character set |
MD5: | D34869B18C1EC994AB1B7A0970A402D7 |
SHA1: | B69CF2698920633C03ED086D08E60DFE6682137A |
SHA256: | E712C548F77200B824C83A643A53ABFE5BEB5CD88374AE4242C5ECFF31E0789A |
SSDEEP: | 12288:s6flgbggmfTpCugpYkuE1jXK+ofFy+SBALAdk/E084XoU3YmHZ+rxgmXVr6FWlpr:lH5yQs08gIHgozlwALTusH0BNmQW |
.rtf | | | Rich Text Format (100) |
---|
InternalVersionNumber: | 57435 |
---|---|
CharactersWithSpaces: | 27 |
Characters: | 24 |
Words: | 4 |
Pages: | 1 |
TotalEditTime: | 1 minute |
RevisionNumber: | 3 |
ModifyDate: | 2019:01:03 16:34:00 |
CreateDate: | 2019:01:03 16:14:00 |
LastModifiedBy: | wuyan |
Author: | wuyan |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2392 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\e712c548f77200b824c83a643a53abfe5beb5cd88374ae4242c5ecff31e0789a.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3556 | "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding | C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE | svchost.exe | |
User: admin Company: Design Science, Inc. Integrity Level: MEDIUM Description: Microsoft Equation Editor Exit code: 0 Version: 00110900 | ||||
264 | cmd /c %tMp%\~.t | C:\Windows\system32\cmd.exe | — | EQNEDT32.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2520 | C:\Users\admin\AppData\Local\Temp\~.t | C:\Users\admin\AppData\Local\Temp\~.t | cmd.exe | |
User: admin Company: Sergey Serkov Integrity Level: MEDIUM Description: Ill Meaningfully |
PID | Process | Filename | Type | |
---|---|---|---|---|
2392 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR8BFB.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2520 | ~.t | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.lck | — | |
MD5:— | SHA256:— | |||
2392 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:B6B72C48CD7441C6852266FF0266FE52 | SHA256:EF7A49DC49FB189B3FDBAD1235CDB424804470E29CA64D5C9A751C0D539F47BC | |||
2520 | ~.t | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.exe | executable | |
MD5:B173593660EB4CC011D3913812366D58 | SHA256:D2E6D66C92F0FFABF5341FFAC37CE307745B9E123361C2BE78D99C94E68E8685 | |||
2392 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E7E562E0.emf | emf | |
MD5:044015C97A3207E092721FA1BE8296DD | SHA256:6C9A096C493262F7671664966F9880E0A2212242C9826E1791477FC94E004880 | |||
2392 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~.t | executable | |
MD5:B173593660EB4CC011D3913812366D58 | SHA256:D2E6D66C92F0FFABF5341FFAC37CE307745B9E123361C2BE78D99C94E68E8685 | |||
2392 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$12c548f77200b824c83a643a53abfe5beb5cd88374ae4242c5ecff31e0789a.doc | pgc | |
MD5:CAD3E78B3429564039F4095A0DA65DA9 | SHA256:F05DCC33BA3CB06555AB99DD1E932281BFE92148B523E9504A2AAA071AD96081 | |||
2520 | ~.t | C:\Users\admin\AppData\Roaming\F63AAA\A71D80.hdb | text | |
MD5:5302B1B5EC232D44E2D9507FB847FC49 | SHA256:20B58A25872B1E3F7D47DAE0C090ACF229C49B6E33939934513499CC37BB2684 | |||
2520 | ~.t | C:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1302019708-1500728564-335382590-1000\0f5007522459c86e95ffcc62f32308f1_90059c37-1320-41a4-b58d-2b75a9850d2f | dbf | |
MD5:18B8CFC0185C50383AAC0A4F30A9DAC8 | SHA256:913E8CED6A447FE791954D382ABA52D490513C5D2F689B391866C7E561F89A03 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2520 | ~.t | POST | 404 | 217.174.152.36:80 | http://armanifile.co.uk/zp/fre.php | BG | text | 15 b | malicious |
2520 | ~.t | POST | 404 | 217.174.152.36:80 | http://armanifile.co.uk/zp/fre.php | BG | text | 15 b | malicious |
2520 | ~.t | POST | 200 | 217.174.152.36:80 | http://armanifile.co.uk/zp/fre.php | BG | binary | 23 b | malicious |
2520 | ~.t | POST | 200 | 217.174.152.36:80 | http://armanifile.co.uk/zp/fre.php | BG | binary | 23 b | malicious |
2520 | ~.t | POST | — | 217.174.152.36:80 | http://armanifile.co.uk/zp/fre.php | BG | — | — | malicious |
2520 | ~.t | POST | 200 | 217.174.152.36:80 | http://armanifile.co.uk/zp/fre.php | BG | binary | 23 b | malicious |
2520 | ~.t | POST | 200 | 217.174.152.36:80 | http://armanifile.co.uk/zp/fre.php | BG | binary | 23 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2520 | ~.t | 217.174.152.36:80 | armanifile.co.uk | NetInfo.BG JSCo | BG | malicious |
Domain | IP | Reputation |
---|---|---|
armanifile.co.uk |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
2520 | ~.t | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
2520 | ~.t | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
2520 | ~.t | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 |
2520 | ~.t | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 |
2520 | ~.t | A Network Trojan was detected | MALWARE [PTsecurity] Loki Bot Check-in M2 |
2520 | ~.t | A Network Trojan was detected | ET TROJAN LokiBot User-Agent (Charon/Inferno) |
2520 | ~.t | A Network Trojan was detected | ET TROJAN LokiBot Checkin |
2520 | ~.t | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 |
2520 | ~.t | A Network Trojan was detected | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 |
2520 | ~.t | A Network Trojan was detected | MALWARE [PTsecurity] Loki Bot Check-in M2 |