top title background image
flash

REQUIREMENTS.exe

Status: finished
Submission Time: 2020-12-03 09:56:14 +01:00
Malicious
Trojan
Spyware
Evader
Lokibot

Comments

Tags

  • exe
  • Loki

Details

  • Analysis ID:
    326330
  • API (Web) ID:
    554464
  • Analysis Started:
    2020-12-03 09:57:24 +01:00
  • Analysis Finished:
    2020-12-03 10:05:36 +01:00
  • MD5:
    70109889c622058fd38e3b14965ca813
  • SHA1:
    c8dbd06cca04210f0be50e741b299d27b3f7a4c2
  • SHA256:
    cfb1834c33817d2fb697bd75004827c5d888e6f62e5db56d2381014e58290821
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

IPs

IP Country Detection
45.134.225.18
Germany

URLs

Name Detection
http://45.134.225.18/plesk-site-preview/endustrigm.eu/http/45.134.225.18/tmoni/Panel/fre.php
http://schemas.microsoft.
http://www.ibsensoftware.com/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\REQUIREMENTS.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\C79A3B\B52B3F.lck
very short file (no magic)
#
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\89dad5d484a9f889a3a8dfca823edc3e_d06ed635-68f6-4e9a-955c-4899f5f57b9a
data
#