Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | July 5, 2021, 9:33 a.m. | July 5, 2021, 9:35 a.m. |
-
D9975372A070C4965F56D329571CD89A.exe "C:\Users\test22\AppData\Local\Temp\D9975372A070C4965F56D329571CD89A.exe"
4208-
D9975372A070C4965F56D329571CD89A.exe "C:\Users\test22\AppData\Local\Temp\D9975372A070C4965F56D329571CD89A.exe"
6192
-
Name | Response | Post-Analysis Lookup |
---|---|---|
mahetechasia.com | 50.17.5.224 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49810 -> 50.17.5.224:80 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | A Network Trojan was detected |
TCP 192.168.56.102:49810 -> 50.17.5.224:80 | 2025381 | ET MALWARE LokiBot Checkin | Malware Command and Control Activity Detected |
TCP 192.168.56.102:49810 -> 50.17.5.224:80 | 2024312 | ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 | A Network Trojan was detected |
TCP 192.168.56.102:49810 -> 50.17.5.224:80 | 2024317 | ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2 | A Network Trojan was detected |
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox |
section | CODE |
section | DATA |
section | BSS |
packer | BobSoft Mini Delphi -> BoB / BobSoft |
suspicious_features | POST method with no referer header, HTTP version 1.0 used | suspicious_request | POST http://mahetechasia.com/data/five/fre.php |
request | POST http://mahetechasia.com/data/five/fre.php |
request | POST http://mahetechasia.com/data/five/fre.php |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data |
file | C:\Users\test22\AppData\Roaming\Opera\Opera Next\data\Default\Login Data |
file | C:\Users\test22\AppData\Roaming\Opera\Opera Next\data\User Data\Default\Web Data |
file | C:\Users\test22\AppData\Roaming\Opera\Opera Next\data\User Data\Default\Login Data |
file | C:\Users\test22\AppData\Roaming\Opera\Opera Next\data\Login Data |
file | C:\Users\test22\AppData\Local\Chromium\User Data\Default\Web Data |
file | C:\Users\test22\AppData\Local\Chromium\User Data\Default\Login Data |
file | C:\Users\test22\AppData\LocalMapleStudio\ChromePlus\Default\Login Data |
file | C:\Users\test22\AppData\Local\MapleStudio\ChromePlus\User Data\Default\Web Data |
file | C:\Users\test22\AppData\Local\MapleStudio\ChromePlus\User Data\Default\Login Data |
file | C:\Users\test22\AppData\LocalMapleStudio\ChromePlus\Login Data |
file | C:\Users\test22\AppData\Local\Nichrome\User Data\Default\Login Data |
file | C:\Users\test22\AppData\Local\Nichrome\User Data\Default\Web Data |
file | C:\Users\test22\AppData\Local\RockMelt\User Data\Default\Login Data |
file | C:\Users\test22\AppData\Local\RockMelt\User Data\Default\Web Data |
file | C:\Users\test22\AppData\Local\Yandex\YandexBrowser\User Data\Default\Web Data |
file | C:\Users\test22\AppData\Local\Yandex\YandexBrowser\User Data\Default\Login Data |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\SeaMonkey |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox |
section | {u'size_of_data': u'0x0000ba00', u'virtual_address': u'0x00073000', u'entropy': 7.502487179934397, u'name': u'DATA', u'virtual_size': u'0x0000b9ec'} | entropy | 7.50248717993 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00025000', u'virtual_address': u'0x0008d000', u'entropy': 7.204166353177293, u'name': u'.rsrc', u'virtual_size': u'0x00024e98'} | entropy | 7.20416635318 | description | A section with a high entropy has been found | |||||||||
entropy | 0.28229317852 | description | Overall entropy of this PE file is high |
url | http://www.ibsensoftware.com/ |
description | Communications use DNS | rule | Network_DNS | ||||||
description | Win32 PWS Loki | rule | Win32_PWS_Loki_Zero | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
host | 172.217.25.14 |
file | C:\Program Files (x86)\FTPGetter\Profile\servers.xml |
file | C:\Users\test22\AppData\Roaming\FTPGetter\servers.xml |
file | C:\Users\test22\AppData\Roaming\Estsoft\ALFTP\ESTdb2.dat |
file | C:\Users\test22\AppData\Roaming\GHISLER\wcx_ftp.ini |
file | C:\Users\test22\AppData\Roaming\wcx_ftp.ini |
file | C:\Windows\wcx_ftp.ini |
file | C:\Users\test22\wcx_ftp.ini |
file | C:\Windows\32BitFtp.ini |
file | C:\Users\test22\AppData\Roaming\FileZilla\sitemanager.xml |
file | C:\Program Files (x86)\FileZilla\Filezilla.xml |
file | C:\Users\test22\AppData\Roaming\FileZilla\recentservers.xml |
file | C:\Users\test22\AppData\Roaming\FileZilla\filezilla.xml |
registry | HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts |
registry | HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts |
registry | HKEY_CURRENT_USER\Software\Ghisler\Total Commander |
registry | HKEY_CURRENT_USER\Software\VanDyke\SecureFX |
registry | HKEY_CURRENT_USER\Software\LinasFTP\Site Manager |
registry | HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\Settings |
registry | HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\Sessions |
registry | HKEY_LOCAL_MACHINE\Software\SimonTatham\PuTTY\Sessions |
registry | HKEY_CURRENT_USER\Software\Martin Prikryl |
registry | HKEY_LOCAL_MACHINE\Software\Martin Prikryl |
file | C:\Users\test22\AppData\Roaming\.purple\accounts.xml |
file | C:\Users\test22\AppData\Roaming\Thunderbird\profiles.ini |
registry | HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Thunderbird\78.4.0 (ko)\Main |
registry | HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook |
Bkav | W32.AIDetect.malware1 |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.GenericKDZ.66831 |
CAT-QuickHeal | Backdoor.AndromPMF.S14100880 |
ALYac | Trojan.GenericKDZ.66831 |
Zillya | Trojan.Injector.Win32.718449 |
K7AntiVirus | Trojan ( 0056583f1 ) |
K7GW | Trojan ( 0056583f1 ) |
Cybereason | malicious.2a070c |
Arcabit | Trojan.Generic.D1050F |
Cyren | W32/DelfInject.CI.gen!Eldorado |
Symantec | Infostealer.Lokibot!43 |
ESET-NOD32 | a variant of Win32/Injector.ELRF |
APEX | Malicious |
ClamAV | Win.Dropper.LokiBot-8195153-0 |
Kaspersky | HEUR:Backdoor.Win32.Androm.gen |
BitDefender | Trojan.GenericKDZ.66831 |
NANO-Antivirus | Trojan.Win32.Stealer.hjobpd |
Avast | Win32:RATX-gen [Trj] |
Tencent | Malware.Win32.Gencirc.11c38f0e |
Ad-Aware | Trojan.GenericKDZ.66831 |
Sophos | ML/PE-A + Mal/Fareit-AA |
DrWeb | Trojan.PWS.Stealer.21154 |
VIPRE | Trojan.Win32.Generic!BT |
McAfee-GW-Edition | BehavesLike.Win32.Fareit.jh |
FireEye | Generic.mg.d9975372a070c496 |
Emsisoft | Trojan.GenericKDZ.66831 (B) |
Ikarus | Trojan.Inject |
Jiangmin | Backdoor.Androm.avox |
Avira | TR/Injector.qmanq |
Antiy-AVL | Trojan/Generic.ASMalwS.305B869 |
Gridinsoft | Trojan.Win32.Kryptik.ba!s1 |
Microsoft | Trojan:Win32/LokiBot.AG!MTB |
ZoneAlarm | HEUR:Backdoor.Win32.Androm.gen |
GData | Trojan.GenericKDZ.66831 |
Cynet | Malicious (score: 99) |
AhnLab-V3 | Suspicious/Win.Delphiless.X2059 |
McAfee | Fareit-FSK!D9975372A070 |
MAX | malware (ai score=80) |
VBA32 | Backdoor.Androm |
Malwarebytes | Trojan.MalPack.DLF.Generic |
Zoner | Trojan.Win32.89628 |
Rising | Trojan.Injector!1.CB27 (CLASSIC) |
Yandex | Trojan.Injector!yUWtF9wqez0 |
SentinelOne | Static AI - Malicious PE |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/Injector.ELKP!tr |
BitDefenderTheta | Gen:NN.ZelphiF.34770.RG0@aev!3mdi |
AVG | Win32:RATX-gen [Trj] |
CrowdStrike | win/malicious_confidence_90% (D) |