ScreenShot
Created | 2021.08.09 23:24 | Machine | s1_win7_x6401 |
Filename | nlx.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 58 detected (AIDetect, malware1, malicious, high confidence, Mauvaise, LokiBot, Unsafe, naKocTb, Save, Eldorado, Fareit, Autoit, Agentb, bvrg, eshrhl, PasswordStealer, CLASSIC, A + Troj, LB@7pzcfo, Siggen2, TSPY, LOKI, Static AI, Suspicious PE, XPACK, ai score=87, ASMalwS, se39734, PrimaryPass, score, R270234, ZexaF, gqW@aOzWOyp, BScope, Gencirc, GenAsa, SBszS2bfSB0, GdSda, confidence, 100%, QVM20) | ||
md5 | 6eb36d8a4c53a3fe89764aa87d468d02 | ||
sha256 | 7b445fd4ac2eb42602ad425b103f55633b1e7136508d000f5218011c5fb7f0a9 | ||
ssdeep | 1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG | ||
imphash | 0239fd611af3d0e9b0c46c5837c80e09 | ||
impfuzzy | 6:TiZ0a/0y/GvP1nRjv7alJy5Xx5X24wNbsKoc9KJApGMKJAm3E0n0Jd6p:Gn/0y/GlRjvoUJxJdwxrnMim3E0wd2 |
Network IP location
Signature (17cnts)
Level | Description |
---|---|
danger | File has been identified by 58 AntiVirus engines on VirusTotal as malicious |
warning | Generates some ICMP traffic |
watch | Harvests credentials from local email clients |
watch | Harvests credentials from local FTP client softwares |
watch | Harvests information related to installed instant messenger clients |
watch | Putty Files |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Moves the original executable to a new location |
notice | Performs some HTTP requests |
notice | Sends data using the HTTP POST Method |
notice | Steals private information from local Internet browsers |
info | Checks amount of memory in system |
info | Collects information to fingerprint the system (MachineGuid |
info | Queries for the computername |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
info | Tries to locate where the browsers are installed |
Rules (4cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | Win32_PWS_Loki_Zero | Win32 PWS Loki | binaries (upload) |
watch | Malicious_Packer_Zero | Malicious Packer | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Suricata ids
ET MALWARE LokiBot User-Agent (Charon/Inferno)
ET MALWARE LokiBot Checkin
ET MALWARE LokiBot Request for C2 Commands Detected M1
ET MALWARE LokiBot Request for C2 Commands Detected M2
ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
ET MALWARE LokiBot Checkin
ET MALWARE LokiBot Request for C2 Commands Detected M1
ET MALWARE LokiBot Request for C2 Commands Detected M2
ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1
ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M2
PE API
IAT(Import Address Table) Library
WS2_32.dll
0x415028 getaddrinfo
0x41502c freeaddrinfo
0x415030 closesocket
0x415034 WSAStartup
0x415038 socket
0x41503c send
0x415040 recv
0x415044 connect
KERNEL32.dll
0x415000 GetProcessHeap
0x415004 HeapFree
0x415008 HeapAlloc
0x41500c SetLastError
0x415010 GetLastError
ole32.dll
0x41504c CoCreateInstance
0x415050 CoInitialize
0x415054 CoUninitialize
OLEAUT32.dll
0x415018 VariantInit
0x41501c SysFreeString
0x415020 SysAllocString
EAT(Export Address Table) is none
WS2_32.dll
0x415028 getaddrinfo
0x41502c freeaddrinfo
0x415030 closesocket
0x415034 WSAStartup
0x415038 socket
0x41503c send
0x415040 recv
0x415044 connect
KERNEL32.dll
0x415000 GetProcessHeap
0x415004 HeapFree
0x415008 HeapAlloc
0x41500c SetLastError
0x415010 GetLastError
ole32.dll
0x41504c CoCreateInstance
0x415050 CoInitialize
0x415054 CoUninitialize
OLEAUT32.dll
0x415018 VariantInit
0x41501c SysFreeString
0x415020 SysAllocString
EAT(Export Address Table) is none