Windows
Analysis Report
wi7zJOZT2r.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- wi7zJOZT2r.exe (PID: 7088 cmdline:
C:\Users\u ser\Deskto p\wi7zJOZT 2r.exe MD5: 3DC7D72C3B38CE465684F96FAEAA0CE7)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Loki Password Stealer (PWS), LokiBot | "Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2 |
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | ||
JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | ||
INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen |
| |
Windows_Trojan_Lokibot_1f885282 | unknown | unknown |
| |
Click to see the 3 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Lokibot_1 | Yara detected Lokibot | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_Lokibot_0f421617 | unknown | unknown |
| |
Windows_Trojan_Lokibot_0f421617 | unknown | unknown |
| |
JoeSecurity_Lokibot_1 | Yara detected Lokibot | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | ||
Click to see the 11 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | ||
JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | ||
INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen |
| |
Windows_Trojan_Lokibot_1f885282 | unknown | unknown |
| |
Click to see the 11 entries |
Timestamp: | 192.168.2.3216.239.38.2149697802021641 08/01/23-04:47:03.589313 |
SID: | 2021641 |
Source Port: | 49697 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.38.2149697802024317 08/01/23-04:47:03.589313 |
SID: | 2024317 |
Source Port: | 49697 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.32.2149702802825766 08/01/23-04:47:05.661750 |
SID: | 2825766 |
Source Port: | 49702 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.38.2149697802024312 08/01/23-04:47:03.589313 |
SID: | 2024312 |
Source Port: | 49697 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.38.2149699802825766 08/01/23-04:47:04.225849 |
SID: | 2825766 |
Source Port: | 49699 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.38.2149697802025381 08/01/23-04:47:03.589313 |
SID: | 2025381 |
Source Port: | 49697 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.32.2149701802825766 08/01/23-04:47:04.869622 |
SID: | 2825766 |
Source Port: | 49701 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.32.2149701802024318 08/01/23-04:47:04.869622 |
SID: | 2024318 |
Source Port: | 49701 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.32.2149701802021641 08/01/23-04:47:04.869622 |
SID: | 2021641 |
Source Port: | 49701 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.38.2149700802825766 08/01/23-04:47:04.525369 |
SID: | 2825766 |
Source Port: | 49700 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.38.2149699802024313 08/01/23-04:47:04.225849 |
SID: | 2024313 |
Source Port: | 49699 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.38.2149700802024318 08/01/23-04:47:04.525369 |
SID: | 2024318 |
Source Port: | 49700 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.38.2149698802024317 08/01/23-04:47:03.996311 |
SID: | 2024317 |
Source Port: | 49698 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.32.2149702802025381 08/01/23-04:47:05.661750 |
SID: | 2025381 |
Source Port: | 49702 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.32.2149701802024313 08/01/23-04:47:04.869622 |
SID: | 2024313 |
Source Port: | 49701 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.38.2149698802021641 08/01/23-04:47:03.996311 |
SID: | 2021641 |
Source Port: | 49698 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.38.2149698802825766 08/01/23-04:47:03.996311 |
SID: | 2825766 |
Source Port: | 49698 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.38.2149699802025381 08/01/23-04:47:04.225849 |
SID: | 2025381 |
Source Port: | 49699 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.38.2149698802024312 08/01/23-04:47:03.996311 |
SID: | 2024312 |
Source Port: | 49698 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.32.2149701802025381 08/01/23-04:47:04.869622 |
SID: | 2025381 |
Source Port: | 49701 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.38.2149699802024318 08/01/23-04:47:04.225849 |
SID: | 2024318 |
Source Port: | 49699 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.32.2149702802024313 08/01/23-04:47:05.661750 |
SID: | 2024313 |
Source Port: | 49702 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.32.2149702802021641 08/01/23-04:47:05.661750 |
SID: | 2021641 |
Source Port: | 49702 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.38.2149700802024313 08/01/23-04:47:04.525369 |
SID: | 2024313 |
Source Port: | 49700 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.38.2149697802825766 08/01/23-04:47:03.589313 |
SID: | 2825766 |
Source Port: | 49697 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.38.2149699802021641 08/01/23-04:47:04.225849 |
SID: | 2021641 |
Source Port: | 49699 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.32.2149702802024318 08/01/23-04:47:05.661750 |
SID: | 2024318 |
Source Port: | 49702 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.38.2149700802021641 08/01/23-04:47:04.525369 |
SID: | 2021641 |
Source Port: | 49700 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.38.2149698802025381 08/01/23-04:47:03.996311 |
SID: | 2025381 |
Source Port: | 49698 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.3216.239.38.2149700802025381 08/01/23-04:47:04.525369 |
SID: | 2025381 |
Source Port: | 49700 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00403D74 |
Networking |
---|
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | Code function: | 0_2_00404ED4 |
Source: | Binary or memory string: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_0040549C | |
Source: | Code function: | 0_2_004029D4 |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Code function: | 0_2_0040650A |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | Code function: | 0_2_0040434D |
Source: | Binary or memory string: |
Source: | Mutant created: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Data Obfuscation |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 0_2_00402AD4 | |
Source: | Code function: | 0_2_00402AFC |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | Code function: | 0_2_00403D74 |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Code function: | 0_2_00402B7C |
Source: | Process token adjusted: | Jump to behavior |
Source: | Code function: | 0_2_0040317B |
Source: | Process queried: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Code function: | 0_2_00406069 |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Code function: | 0_2_0040D069 | |
Source: | Code function: | 0_2_0040D069 |
Source: | File opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Access Token Manipulation | 1 Masquerading | 2 OS Credential Dumping | 21 Security Software Discovery | Remote Services | 1 Email Collection | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 21 Virtualization/Sandbox Evasion | 1 Input Capture | 21 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Input Capture | Exfiltration Over Bluetooth | 1 Ingress Tool Transfer | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 1 Access Token Manipulation | 2 Credentials in Registry | 1 Account Discovery | SMB/Windows Admin Shares | 1 Archive Collected Data | Automated Exfiltration | 2 Non-Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 1 Deobfuscate/Decode Files or Information | NTDS | 1 System Owner/User Discovery | Distributed Component Object Model | 2 Data from Local System | Scheduled Transfer | 112 Application Layer Protocol | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | 2 Obfuscated Files or Information | LSA Secrets | 1 Remote System Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Steganography | Cached Domain Credentials | 1 File and Directory Discovery | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features | |
External Remote Services | Scheduled Task | Startup Items | Startup Items | Compile After Delivery | DCSync | 3 System Information Discovery | Windows Remote Management | Web Portal Capture | Exfiltration Over Alternative Protocol | Commonly Used Port | Rogue Wi-Fi Access Points | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | ReversingLabs | Win32.Trojan.LokiBot | ||
89% | Virustotal | Browse | ||
100% | Avira | TR/Crypt.XPACK.Gen | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
17% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
10% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
publicspeaking.co.id | 216.239.38.21 | true | false |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
false |
| unknown | |
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
216.239.38.21 | publicspeaking.co.id | United States | 15169 | GOOGLEUS | false | |
216.239.32.21 | unknown | United States | 15169 | GOOGLEUS | false |
Joe Sandbox Version: | 38.0.0 Beryl |
Analysis ID: | 1283498 |
Start date and time: | 2023-08-01 04:46:07 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 2m 49s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 1 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample file name: | wi7zJOZT2r.exe |
Original Sample Name: | 3dc7d72c3b38ce465684f96faeaa0ce7.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@1/2@7/2 |
EGA Information: |
|
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Report size getting too big, too many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
04:47:04 | API Interceptor |
Process: | C:\Users\user\Desktop\wi7zJOZT2r.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:U:U |
MD5: | C4CA4238A0B923820DCC509A6F75849B |
SHA1: | 356A192B7913B04C54574D18C28D46E6395428AB |
SHA-256: | 6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B |
SHA-512: | 4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\414045e2d09286d5db2581e0d955d358_d06ed635-68f6-4e9a-955c-4899f5f57b9a
Download File
Process: | C:\Users\user\Desktop\wi7zJOZT2r.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 46 |
Entropy (8bit): | 1.0424600748477153 |
Encrypted: | false |
SSDEEP: | 3:/lbON:u |
MD5: | 89CA7E02D8B79ED50986F098D5686EC9 |
SHA1: | A602E0D4398F00C827BFCF711066E67718CA1377 |
SHA-256: | 30AC626CBD4A97DB480A0379F6D2540195F594C967B7087A26566E352F24C794 |
SHA-512: | C5F453E32C0297E51BE43F84A7E63302E7D1E471FADF8BB789C22A4D6E03712D26E2B039D6FBDBD9EBD35C4E93EC27F03684A7BBB67C4FADCCE9F6279417B5DE |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 6.0585127096924465 |
TrID: |
|
File name: | wi7zJOZT2r.exe |
File size: | 106'496 bytes |
MD5: | 3dc7d72c3b38ce465684f96faeaa0ce7 |
SHA1: | 491568fcf9f2e718d587621361b0e82b681c9b8d |
SHA256: | 5388ab765bd614a7350d9ce7126afab89ca2e0b0e55d23e1cd43459cb9bc745d |
SHA512: | d7fb5bd29a2e0da7405c3890c62e830998e8db7328b908d673248643af96f73adc0c19523c317a454f6d689fcf7d5fd4bee093513ed8b8f1233ec3794565bdf6 |
SSDEEP: | 1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqEIzmd:nSHIG6mQwGmfOQd8YhY0/ExUG |
TLSH: | BFA31942B2A5C030F7B74DB2BB73A5B7857E7C332D22C84E9352459A14215E1EB7AB13 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........x.....................K.K.............=2......................................=2......=2......Rich............PE..L.....lW... |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x4139de |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | TERMINAL_SERVER_AWARE |
Time Stamp: | 0x576C0885 [Thu Jun 23 16:04:21 2016 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 1 |
File Version Major: | 5 |
File Version Minor: | 1 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 1 |
Import Hash: | 0239fd611af3d0e9b0c46c5837c80e09 |
Instruction |
---|
push ebp |
mov ebp, esp |
push ecx |
and dword ptr [ebp-04h], 00000000h |
lea eax, dword ptr [ebp-04h] |
push esi |
push edi |
push eax |
call 00007F73B53E3C59h |
push eax |
call 00007F73B53E3C36h |
xor esi, esi |
mov edi, eax |
pop ecx |
pop ecx |
cmp dword ptr [ebp-04h], esi |
jle 00007F73B53E3E16h |
push 004188BCh |
push dword ptr [edi+esi*4] |
call 00007F73B53D62E5h |
pop ecx |
pop ecx |
test eax, eax |
je 00007F73B53E3DFDh |
push 00002710h |
call 00007F73B53D6B9Ah |
pop ecx |
inc esi |
cmp esi, dword ptr [ebp-04h] |
jl 00007F73B53E3DCEh |
push 00000000h |
call 00007F73B53E3C2Eh |
push 00000000h |
call 00007F73B53E3F42h |
pop ecx |
pop edi |
xor eax, eax |
pop esi |
mov esp, ebp |
pop ebp |
retn 0010h |
push ebp |
mov ebp, esp |
xor eax, eax |
push eax |
push eax |
push E567384Dh |
push eax |
call 00007F73B53D3589h |
push dword ptr [ebp+08h] |
call eax |
pop ebp |
ret |
push ebp |
mov ebp, esp |
push esi |
mov esi, dword ptr [ebp+08h] |
test esi, esi |
je 00007F73B53E3E54h |
push esi |
call 00007F73B53D60B0h |
pop ecx |
test eax, eax |
je 00007F73B53E3E49h |
push esi |
call 00007F73B53D40ECh |
pop ecx |
test eax, eax |
je 00007F73B53E3E3Eh |
mov eax, dword ptr [0049FDECh] |
cmp dword ptr [ebp+10h], 00000000h |
cmovne eax, dword ptr [ebp+10h] |
push eax |
push dword ptr [0049FDE8h] |
call 00007F73B53D5AE4h |
push dword ptr [ebp+0Ch] |
push dword ptr [0049FDE8h] |
call 00007F73B53D5AD6h |
push 00000000h |
push 00000000h |
push esi |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x18ed0 | 0x64 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x15000 | 0x5c | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x136f5 | 0x13800 | False | 0.5685096153846154 | data | 6.49204829439013 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x15000 | 0x4060 | 0x4200 | False | 0.3700284090909091 | DOS executable (COM) | 4.268966749321832 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x1a000 | 0x85e24 | 0x200 | False | 0.130859375 | OpenPGP Public Key | 0.941116049548311 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.x | 0xa0000 | 0x2000 | 0x2000 | False | 0.02001953125 | data | 0.2244612956123434 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
DLL | Import |
---|---|
WS2_32.dll | getaddrinfo, freeaddrinfo, closesocket, WSAStartup, socket, send, recv, connect |
KERNEL32.dll | GetProcessHeap, HeapFree, HeapAlloc, SetLastError, GetLastError |
ole32.dll | CoCreateInstance, CoInitialize, CoUninitialize |
OLEAUT32.dll | VariantInit, SysFreeString, SysAllocString |
Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
192.168.2.3216.239.38.2149697802021641 08/01/23-04:47:03.589313 | TCP | 2021641 | ET TROJAN LokiBot User-Agent (Charon/Inferno) | 49697 | 80 | 192.168.2.3 | 216.239.38.21 |
192.168.2.3216.239.38.2149697802024317 08/01/23-04:47:03.589313 | TCP | 2024317 | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 | 49697 | 80 | 192.168.2.3 | 216.239.38.21 |
192.168.2.3216.239.32.2149702802825766 08/01/23-04:47:05.661750 | TCP | 2825766 | ETPRO TROJAN LokiBot Checkin M2 | 49702 | 80 | 192.168.2.3 | 216.239.32.21 |
192.168.2.3216.239.38.2149697802024312 08/01/23-04:47:03.589313 | TCP | 2024312 | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 | 49697 | 80 | 192.168.2.3 | 216.239.38.21 |
192.168.2.3216.239.38.2149699802825766 08/01/23-04:47:04.225849 | TCP | 2825766 | ETPRO TROJAN LokiBot Checkin M2 | 49699 | 80 | 192.168.2.3 | 216.239.38.21 |
192.168.2.3216.239.38.2149697802025381 08/01/23-04:47:03.589313 | TCP | 2025381 | ET TROJAN LokiBot Checkin | 49697 | 80 | 192.168.2.3 | 216.239.38.21 |
192.168.2.3216.239.32.2149701802825766 08/01/23-04:47:04.869622 | TCP | 2825766 | ETPRO TROJAN LokiBot Checkin M2 | 49701 | 80 | 192.168.2.3 | 216.239.32.21 |
192.168.2.3216.239.32.2149701802024318 08/01/23-04:47:04.869622 | TCP | 2024318 | ET TROJAN LokiBot Request for C2 Commands Detected M2 | 49701 | 80 | 192.168.2.3 | 216.239.32.21 |
192.168.2.3216.239.32.2149701802021641 08/01/23-04:47:04.869622 | TCP | 2021641 | ET TROJAN LokiBot User-Agent (Charon/Inferno) | 49701 | 80 | 192.168.2.3 | 216.239.32.21 |
192.168.2.3216.239.38.2149700802825766 08/01/23-04:47:04.525369 | TCP | 2825766 | ETPRO TROJAN LokiBot Checkin M2 | 49700 | 80 | 192.168.2.3 | 216.239.38.21 |
192.168.2.3216.239.38.2149699802024313 08/01/23-04:47:04.225849 | TCP | 2024313 | ET TROJAN LokiBot Request for C2 Commands Detected M1 | 49699 | 80 | 192.168.2.3 | 216.239.38.21 |
192.168.2.3216.239.38.2149700802024318 08/01/23-04:47:04.525369 | TCP | 2024318 | ET TROJAN LokiBot Request for C2 Commands Detected M2 | 49700 | 80 | 192.168.2.3 | 216.239.38.21 |
192.168.2.3216.239.38.2149698802024317 08/01/23-04:47:03.996311 | TCP | 2024317 | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 | 49698 | 80 | 192.168.2.3 | 216.239.38.21 |
192.168.2.3216.239.32.2149702802025381 08/01/23-04:47:05.661750 | TCP | 2025381 | ET TROJAN LokiBot Checkin | 49702 | 80 | 192.168.2.3 | 216.239.32.21 |
192.168.2.3216.239.32.2149701802024313 08/01/23-04:47:04.869622 | TCP | 2024313 | ET TROJAN LokiBot Request for C2 Commands Detected M1 | 49701 | 80 | 192.168.2.3 | 216.239.32.21 |
192.168.2.3216.239.38.2149698802021641 08/01/23-04:47:03.996311 | TCP | 2021641 | ET TROJAN LokiBot User-Agent (Charon/Inferno) | 49698 | 80 | 192.168.2.3 | 216.239.38.21 |
192.168.2.3216.239.38.2149698802825766 08/01/23-04:47:03.996311 | TCP | 2825766 | ETPRO TROJAN LokiBot Checkin M2 | 49698 | 80 | 192.168.2.3 | 216.239.38.21 |
192.168.2.3216.239.38.2149699802025381 08/01/23-04:47:04.225849 | TCP | 2025381 | ET TROJAN LokiBot Checkin | 49699 | 80 | 192.168.2.3 | 216.239.38.21 |
192.168.2.3216.239.38.2149698802024312 08/01/23-04:47:03.996311 | TCP | 2024312 | ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 | 49698 | 80 | 192.168.2.3 | 216.239.38.21 |
192.168.2.3216.239.32.2149701802025381 08/01/23-04:47:04.869622 | TCP | 2025381 | ET TROJAN LokiBot Checkin | 49701 | 80 | 192.168.2.3 | 216.239.32.21 |
192.168.2.3216.239.38.2149699802024318 08/01/23-04:47:04.225849 | TCP | 2024318 | ET TROJAN LokiBot Request for C2 Commands Detected M2 | 49699 | 80 | 192.168.2.3 | 216.239.38.21 |
192.168.2.3216.239.32.2149702802024313 08/01/23-04:47:05.661750 | TCP | 2024313 | ET TROJAN LokiBot Request for C2 Commands Detected M1 | 49702 | 80 | 192.168.2.3 | 216.239.32.21 |
192.168.2.3216.239.32.2149702802021641 08/01/23-04:47:05.661750 | TCP | 2021641 | ET TROJAN LokiBot User-Agent (Charon/Inferno) | 49702 | 80 | 192.168.2.3 | 216.239.32.21 |
192.168.2.3216.239.38.2149700802024313 08/01/23-04:47:04.525369 | TCP | 2024313 | ET TROJAN LokiBot Request for C2 Commands Detected M1 | 49700 | 80 | 192.168.2.3 | 216.239.38.21 |
192.168.2.3216.239.38.2149697802825766 08/01/23-04:47:03.589313 | TCP | 2825766 | ETPRO TROJAN LokiBot Checkin M2 | 49697 | 80 | 192.168.2.3 | 216.239.38.21 |
192.168.2.3216.239.38.2149699802021641 08/01/23-04:47:04.225849 | TCP | 2021641 | ET TROJAN LokiBot User-Agent (Charon/Inferno) | 49699 | 80 | 192.168.2.3 | 216.239.38.21 |
192.168.2.3216.239.32.2149702802024318 08/01/23-04:47:05.661750 | TCP | 2024318 | ET TROJAN LokiBot Request for C2 Commands Detected M2 | 49702 | 80 | 192.168.2.3 | 216.239.32.21 |
192.168.2.3216.239.38.2149700802021641 08/01/23-04:47:04.525369 | TCP | 2021641 | ET TROJAN LokiBot User-Agent (Charon/Inferno) | 49700 | 80 | 192.168.2.3 | 216.239.38.21 |
192.168.2.3216.239.38.2149698802025381 08/01/23-04:47:03.996311 | TCP | 2025381 | ET TROJAN LokiBot Checkin | 49698 | 80 | 192.168.2.3 | 216.239.38.21 |
192.168.2.3216.239.38.2149700802025381 08/01/23-04:47:04.525369 | TCP | 2025381 | ET TROJAN LokiBot Checkin | 49700 | 80 | 192.168.2.3 | 216.239.38.21 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Aug 1, 2023 04:47:03.568627119 CEST | 49697 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:03.583986044 CEST | 80 | 49697 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:03.584297895 CEST | 49697 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:03.589313030 CEST | 49697 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:03.604464054 CEST | 80 | 49697 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:03.604659081 CEST | 49697 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:03.619658947 CEST | 80 | 49697 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:03.685257912 CEST | 80 | 49697 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:03.685352087 CEST | 80 | 49697 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:03.685589075 CEST | 49697 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:03.685652018 CEST | 49697 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:03.700661898 CEST | 80 | 49697 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:03.978554010 CEST | 49698 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:03.993669987 CEST | 80 | 49698 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:03.993837118 CEST | 49698 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:03.996310949 CEST | 49698 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:04.011255026 CEST | 80 | 49698 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.011425972 CEST | 49698 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:04.026386976 CEST | 80 | 49698 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.040185928 CEST | 80 | 49698 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.040244102 CEST | 80 | 49698 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.040344954 CEST | 49698 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:04.040489912 CEST | 49698 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:04.055339098 CEST | 80 | 49698 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.187382936 CEST | 49699 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:04.210637093 CEST | 80 | 49699 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.210772991 CEST | 49699 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:04.225848913 CEST | 49699 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:04.249619007 CEST | 80 | 49699 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.249774933 CEST | 49699 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:04.264486074 CEST | 80 | 49699 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.278326988 CEST | 80 | 49699 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.278386116 CEST | 80 | 49699 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.278527975 CEST | 49699 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:04.278604031 CEST | 49699 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:04.293205976 CEST | 80 | 49699 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.498852968 CEST | 49700 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:04.522512913 CEST | 80 | 49700 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.522819996 CEST | 49700 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:04.525368929 CEST | 49700 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:04.548949957 CEST | 80 | 49700 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.549263000 CEST | 49700 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:04.573092937 CEST | 80 | 49700 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.586734056 CEST | 80 | 49700 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.586822033 CEST | 80 | 49700 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.586877108 CEST | 49700 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:04.586877108 CEST | 49700 | 80 | 192.168.2.3 | 216.239.38.21 |
Aug 1, 2023 04:47:04.610507965 CEST | 80 | 49700 | 216.239.38.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.843168020 CEST | 49701 | 80 | 192.168.2.3 | 216.239.32.21 |
Aug 1, 2023 04:47:04.866842985 CEST | 80 | 49701 | 216.239.32.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.867111921 CEST | 49701 | 80 | 192.168.2.3 | 216.239.32.21 |
Aug 1, 2023 04:47:04.869621992 CEST | 49701 | 80 | 192.168.2.3 | 216.239.32.21 |
Aug 1, 2023 04:47:04.893163919 CEST | 80 | 49701 | 216.239.32.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.893372059 CEST | 49701 | 80 | 192.168.2.3 | 216.239.32.21 |
Aug 1, 2023 04:47:04.908437967 CEST | 80 | 49701 | 216.239.32.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.969077110 CEST | 80 | 49701 | 216.239.32.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.969125986 CEST | 80 | 49701 | 216.239.32.21 | 192.168.2.3 |
Aug 1, 2023 04:47:04.969244957 CEST | 49701 | 80 | 192.168.2.3 | 216.239.32.21 |
Aug 1, 2023 04:47:04.969460964 CEST | 49701 | 80 | 192.168.2.3 | 216.239.32.21 |
Aug 1, 2023 04:47:04.984335899 CEST | 80 | 49701 | 216.239.32.21 | 192.168.2.3 |
Aug 1, 2023 04:47:05.643455982 CEST | 49702 | 80 | 192.168.2.3 | 216.239.32.21 |
Aug 1, 2023 04:47:05.658570051 CEST | 80 | 49702 | 216.239.32.21 | 192.168.2.3 |
Aug 1, 2023 04:47:05.659156084 CEST | 49702 | 80 | 192.168.2.3 | 216.239.32.21 |
Aug 1, 2023 04:47:05.661750078 CEST | 49702 | 80 | 192.168.2.3 | 216.239.32.21 |
Aug 1, 2023 04:47:05.676728010 CEST | 80 | 49702 | 216.239.32.21 | 192.168.2.3 |
Aug 1, 2023 04:47:05.676820993 CEST | 49702 | 80 | 192.168.2.3 | 216.239.32.21 |
Aug 1, 2023 04:47:05.691808939 CEST | 80 | 49702 | 216.239.32.21 | 192.168.2.3 |
Aug 1, 2023 04:47:05.705703974 CEST | 80 | 49702 | 216.239.32.21 | 192.168.2.3 |
Aug 1, 2023 04:47:05.705758095 CEST | 80 | 49702 | 216.239.32.21 | 192.168.2.3 |
Aug 1, 2023 04:47:05.705849886 CEST | 49702 | 80 | 192.168.2.3 | 216.239.32.21 |
Aug 1, 2023 04:47:05.706306934 CEST | 49702 | 80 | 192.168.2.3 | 216.239.32.21 |
Aug 1, 2023 04:47:05.729837894 CEST | 80 | 49702 | 216.239.32.21 | 192.168.2.3 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Aug 1, 2023 04:47:03.526540041 CEST | 57990 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 1, 2023 04:47:03.555804014 CEST | 53 | 57990 | 8.8.8.8 | 192.168.2.3 |
Aug 1, 2023 04:47:03.920677900 CEST | 52387 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 1, 2023 04:47:03.976876974 CEST | 53 | 52387 | 8.8.8.8 | 192.168.2.3 |
Aug 1, 2023 04:47:04.155936956 CEST | 56924 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 1, 2023 04:47:04.184673071 CEST | 53 | 56924 | 8.8.8.8 | 192.168.2.3 |
Aug 1, 2023 04:47:04.482528925 CEST | 60625 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 1, 2023 04:47:04.497777939 CEST | 53 | 60625 | 8.8.8.8 | 192.168.2.3 |
Aug 1, 2023 04:47:04.796644926 CEST | 49302 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 1, 2023 04:47:04.841779947 CEST | 53 | 49302 | 8.8.8.8 | 192.168.2.3 |
Aug 1, 2023 04:47:05.286439896 CEST | 53975 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 1, 2023 04:47:05.642297983 CEST | 53 | 53975 | 8.8.8.8 | 192.168.2.3 |
Aug 1, 2023 04:47:05.947508097 CEST | 51139 | 53 | 192.168.2.3 | 8.8.8.8 |
Aug 1, 2023 04:47:06.153187037 CEST | 53 | 51139 | 8.8.8.8 | 192.168.2.3 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Aug 1, 2023 04:47:03.526540041 CEST | 192.168.2.3 | 8.8.8.8 | 0xbf7b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Aug 1, 2023 04:47:03.920677900 CEST | 192.168.2.3 | 8.8.8.8 | 0x32d0 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Aug 1, 2023 04:47:04.155936956 CEST | 192.168.2.3 | 8.8.8.8 | 0xd25d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Aug 1, 2023 04:47:04.482528925 CEST | 192.168.2.3 | 8.8.8.8 | 0xd56a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Aug 1, 2023 04:47:04.796644926 CEST | 192.168.2.3 | 8.8.8.8 | 0xbee4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Aug 1, 2023 04:47:05.286439896 CEST | 192.168.2.3 | 8.8.8.8 | 0x1a3 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Aug 1, 2023 04:47:05.947508097 CEST | 192.168.2.3 | 8.8.8.8 | 0x9e7e | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Aug 1, 2023 04:47:03.555804014 CEST | 8.8.8.8 | 192.168.2.3 | 0xbf7b | No error (0) | 216.239.38.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:03.555804014 CEST | 8.8.8.8 | 192.168.2.3 | 0xbf7b | No error (0) | 216.239.36.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:03.555804014 CEST | 8.8.8.8 | 192.168.2.3 | 0xbf7b | No error (0) | 216.239.32.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:03.555804014 CEST | 8.8.8.8 | 192.168.2.3 | 0xbf7b | No error (0) | 216.239.34.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:03.976876974 CEST | 8.8.8.8 | 192.168.2.3 | 0x32d0 | No error (0) | 216.239.38.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:03.976876974 CEST | 8.8.8.8 | 192.168.2.3 | 0x32d0 | No error (0) | 216.239.34.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:03.976876974 CEST | 8.8.8.8 | 192.168.2.3 | 0x32d0 | No error (0) | 216.239.32.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:03.976876974 CEST | 8.8.8.8 | 192.168.2.3 | 0x32d0 | No error (0) | 216.239.36.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:04.184673071 CEST | 8.8.8.8 | 192.168.2.3 | 0xd25d | No error (0) | 216.239.38.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:04.184673071 CEST | 8.8.8.8 | 192.168.2.3 | 0xd25d | No error (0) | 216.239.34.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:04.184673071 CEST | 8.8.8.8 | 192.168.2.3 | 0xd25d | No error (0) | 216.239.32.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:04.184673071 CEST | 8.8.8.8 | 192.168.2.3 | 0xd25d | No error (0) | 216.239.36.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:04.497777939 CEST | 8.8.8.8 | 192.168.2.3 | 0xd56a | No error (0) | 216.239.38.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:04.497777939 CEST | 8.8.8.8 | 192.168.2.3 | 0xd56a | No error (0) | 216.239.34.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:04.497777939 CEST | 8.8.8.8 | 192.168.2.3 | 0xd56a | No error (0) | 216.239.32.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:04.497777939 CEST | 8.8.8.8 | 192.168.2.3 | 0xd56a | No error (0) | 216.239.36.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:04.841779947 CEST | 8.8.8.8 | 192.168.2.3 | 0xbee4 | No error (0) | 216.239.32.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:04.841779947 CEST | 8.8.8.8 | 192.168.2.3 | 0xbee4 | No error (0) | 216.239.36.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:04.841779947 CEST | 8.8.8.8 | 192.168.2.3 | 0xbee4 | No error (0) | 216.239.38.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:04.841779947 CEST | 8.8.8.8 | 192.168.2.3 | 0xbee4 | No error (0) | 216.239.34.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:05.642297983 CEST | 8.8.8.8 | 192.168.2.3 | 0x1a3 | No error (0) | 216.239.32.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:05.642297983 CEST | 8.8.8.8 | 192.168.2.3 | 0x1a3 | No error (0) | 216.239.38.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:05.642297983 CEST | 8.8.8.8 | 192.168.2.3 | 0x1a3 | No error (0) | 216.239.36.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:05.642297983 CEST | 8.8.8.8 | 192.168.2.3 | 0x1a3 | No error (0) | 216.239.34.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:06.153187037 CEST | 8.8.8.8 | 192.168.2.3 | 0x9e7e | No error (0) | 216.239.32.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:06.153187037 CEST | 8.8.8.8 | 192.168.2.3 | 0x9e7e | No error (0) | 216.239.34.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:06.153187037 CEST | 8.8.8.8 | 192.168.2.3 | 0x9e7e | No error (0) | 216.239.36.21 | A (IP address) | IN (0x0001) | false | ||
Aug 1, 2023 04:47:06.153187037 CEST | 8.8.8.8 | 192.168.2.3 | 0x9e7e | No error (0) | 216.239.38.21 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.3 | 49697 | 216.239.38.21 | 80 | C:\Users\user\Desktop\wi7zJOZT2r.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Aug 1, 2023 04:47:03.589313030 CEST | 93 | OUT | |
Aug 1, 2023 04:47:03.604659081 CEST | 94 | OUT | |
Aug 1, 2023 04:47:03.685257912 CEST | 94 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
1 | 192.168.2.3 | 49698 | 216.239.38.21 | 80 | C:\Users\user\Desktop\wi7zJOZT2r.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Aug 1, 2023 04:47:03.996310949 CEST | 95 | OUT | |
Aug 1, 2023 04:47:04.011425972 CEST | 95 | OUT | |
Aug 1, 2023 04:47:04.040185928 CEST | 96 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
2 | 192.168.2.3 | 49699 | 216.239.38.21 | 80 | C:\Users\user\Desktop\wi7zJOZT2r.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Aug 1, 2023 04:47:04.225848913 CEST | 97 | OUT | |
Aug 1, 2023 04:47:04.249774933 CEST | 97 | OUT | |
Aug 1, 2023 04:47:04.278326988 CEST | 98 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
3 | 192.168.2.3 | 49700 | 216.239.38.21 | 80 | C:\Users\user\Desktop\wi7zJOZT2r.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Aug 1, 2023 04:47:04.525368929 CEST | 99 | OUT | |
Aug 1, 2023 04:47:04.549263000 CEST | 99 | OUT | |
Aug 1, 2023 04:47:04.586734056 CEST | 100 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
4 | 192.168.2.3 | 49701 | 216.239.32.21 | 80 | C:\Users\user\Desktop\wi7zJOZT2r.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Aug 1, 2023 04:47:04.869621992 CEST | 101 | OUT | |
Aug 1, 2023 04:47:04.893372059 CEST | 101 | OUT | |
Aug 1, 2023 04:47:04.969077110 CEST | 101 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
5 | 192.168.2.3 | 49702 | 216.239.32.21 | 80 | C:\Users\user\Desktop\wi7zJOZT2r.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Aug 1, 2023 04:47:05.661750078 CEST | 102 | OUT | |
Aug 1, 2023 04:47:05.676820993 CEST | 103 | OUT | |
Aug 1, 2023 04:47:05.705703974 CEST | 103 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 04:47:01 |
Start date: | 01/08/2023 |
Path: | C:\Users\user\Desktop\wi7zJOZT2r.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 106'496 bytes |
MD5 hash: | 3DC7D72C3B38CE465684F96FAEAA0CE7 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Execution Graph
Execution Coverage: | 31.9% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 4.5% |
Total number of Nodes: | 1831 |
Total number of Limit Nodes: | 93 |
Graph
Function 00403D74 Relevance: 14.2, APIs: 4, Strings: 4, Instructions: 200fileCOMMON
Control-flow Graph
C-Code - Quality: 85% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 78% |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00402B7C Relevance: 3.0, APIs: 2, Instructions: 20memoryCOMMON
C-Code - Quality: 100% |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00406069 Relevance: 1.5, APIs: 1, Instructions: 12COMMON
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00404ED4 Relevance: 1.5, APIs: 1, Instructions: 9networkCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
C-Code - Quality: 75% |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00404E17 Relevance: 7.6, APIs: 5, Instructions: 72networkCOMMON
Control-flow Graph
C-Code - Quality: 37% |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004040BB Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 129filememoryCOMMON
Control-flow Graph
C-Code - Quality: 74% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 79% |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004042CF Relevance: 4.6, APIs: 3, Instructions: 60fileCOMMON
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00412D31 Relevance: 3.7, APIs: 1, Strings: 1, Instructions: 178threadCOMMON
C-Code - Quality: 34% |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 100% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 100% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00402C03 Relevance: 3.5, APIs: 1, Strings: 1, Instructions: 13libraryloaderCOMMON
C-Code - Quality: 100% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 92% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004060BD Relevance: 1.6, APIs: 1, Instructions: 53COMMON
C-Code - Quality: 40% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403C62 Relevance: 1.5, APIs: 1, Instructions: 24COMMON
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040642C Relevance: 1.5, APIs: 1, Instructions: 18COMMON
C-Code - Quality: 37% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00404EEA Relevance: 1.5, APIs: 1, Instructions: 16networkCOMMON
C-Code - Quality: 37% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403BD0 Relevance: 1.5, APIs: 1, Instructions: 14COMMON
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00404DF3 Relevance: 1.5, APIs: 1, Instructions: 13networkCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040427D Relevance: 1.5, APIs: 1, Instructions: 13COMMON
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403C40 Relevance: 1.5, APIs: 1, Instructions: 12COMMON
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403C08 Relevance: 1.5, APIs: 1, Instructions: 12fileCOMMON
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00402C1F Relevance: 1.5, APIs: 1, Instructions: 12libraryCOMMON
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403BEF Relevance: 1.5, APIs: 1, Instructions: 12COMMON
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403BB7 Relevance: 1.5, APIs: 1, Instructions: 12COMMON
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403B64 Relevance: 1.5, APIs: 1, Instructions: 11COMMON
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00404DE5 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00403F9E Relevance: 1.3, APIs: 1, Instructions: 16COMMON
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00406472 Relevance: 1.3, APIs: 1, Instructions: 12sleepCOMMON
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004058EA Relevance: 1.3, APIs: 1, Instructions: 12COMMON
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00405924 Relevance: 1.3, APIs: 1, Instructions: 12COMMON
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040D069 Relevance: 12.6, Strings: 10, Instructions: 138COMMON
C-Code - Quality: 88% |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040549C Relevance: .1, Instructions: 146COMMONCrypto
C-Code - Quality: 100% |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004029D4 Relevance: .1, Instructions: 77COMMONCrypto
C-Code - Quality: 92% |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040317B Relevance: .0, Instructions: 46COMMON
C-Code - Quality: 90% |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |