top title background image
flash

MV NAGOYA TRADER.xlsx

Status: finished
Submission Time: 2020-12-21 08:10:20 +01:00
Malicious
Trojan
Spyware
Exploiter
Evader
Lokibot

Comments

Tags

  • Loki
  • VelvetSweatshop
  • xlsx

Details

  • Analysis ID:
    332678
  • API (Web) ID:
    567183
  • Analysis Started:
    2020-12-21 08:31:47 +01:00
  • Analysis Finished:
    2020-12-21 08:39:01 +01:00
  • MD5:
    dd41f88e3d53755f0aa1318bf473d08b
  • SHA1:
    54ccf49aaf860ab2531b37dd38adc0273b6f2551
  • SHA256:
    6f68432c8c109e52980cef46236114266c97a5791808053b07a943d7686f8f55
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)

Third Party Analysis Engines

malicious
Score: 15/47
malicious
Score: 15/46
malicious

IPs

IP Country Detection
103.141.138.119
Viet Nam
185.193.143.118
Russian Federation

Domains

Name IP Detection
begadi.ga
185.193.143.118
chnesstdyqudusisabadassniggainthestfmv.ydns.eu
103.141.138.119

URLs

Name Detection
http://chnesstdyqudusisabadassniggainthestfmv.ydns.eu/secure/svchost.exe
http://begadi.ga/chud/gate.php
http://www.%s.comPA
Click to see the 2 hidden entries
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
http://www.ibsensoftware.com/

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
C:\Users\user\Desktop\~$MV NAGOYA TRADER.xlsx
data
#
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
#
Click to see the 5 hidden entries
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3CDE7269.jpeg
gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9981CA08.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E522A556.jpeg
gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
#
C:\Users\user\AppData\Roaming\CF97F5\5879F5.lck
very short file (no magic)
#
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-966771315-3019405637-367336477-1006\f554348b930ff81505ce47f7c6b7d232_ea860e7a-a87f-4a88-92ef-38f744458171
data
#