top title background image
flash

lRcSwHsBhV.rtf

Status: finished
Submission Time: 2020-10-27 17:20:41 +01:00
Malicious
Trojan
Spyware
Exploiter
Evader
Lokibot

Comments

Tags

  • Loki
  • rtf

Details

  • Analysis ID:
    306088
  • API (Web) ID:
    513958
  • Analysis Started:
    2020-10-27 17:25:30 +01:00
  • Analysis Finished:
    2020-10-27 17:34:22 +01:00
  • MD5:
    c6db36427196fda4ac4f4bae1fee7a97
  • SHA1:
    3622fe92b6a213ffcd7a0a673311e785fa1a371e
  • SHA256:
    92f7f3c0b9d8b8ffff5ce7fe6dde881eee52f3868b6d2196d6fecbd1bc967f0d
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 14/80
malicious
Score: 18/48
malicious

IPs

IP Country Detection
103.133.108.6
Viet Nam
91.203.192.84
Russian Federation

Domains

Name IP Detection
asdfghjklzxcvbnmmnbvcxzlkjhgfdsapoiuytre.ydns.eu
103.133.108.6
magicview.ga
91.203.192.84

URLs

Name Detection
http://asdfghjklzxcvbnmmnbvcxzlkjhgfdsapoiuytre.ydns.eu/kung.exe
http://magicview.ga/chang/gate.php

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\kung[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B7CA7515-A895-478C-8EF6-6349A27B2C7C}.tmp
data
#
Click to see the 7 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BD5610A3-4E04-4856-9DA8-291722E1F767}.tmp
data
#
C:\Users\user\AppData\Roaming\CF97F5\5879F5.lck
very short file (no magic)
#
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-966771315-3019405637-367336477-1006\f554348b930ff81505ce47f7c6b7d232_ea860e7a-a87f-4a88-92ef-38f744458171
data
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\lRcSwHsBhV.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:14 2020, mtime=Wed Aug 26 14:08:14 2020, atime=Tue Oct 27 23:26:35 2020, length=12310, window=hide
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\Desktop\~$cSwHsBhV.rtf
data
#