Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 01:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
20aeb22457a14a29f5ab54b61db56759d492a72b0dc7a55575914e89bedaf177.exe
Resource
win7-20240611-en
3 signatures
150 seconds
General
-
Target
20aeb22457a14a29f5ab54b61db56759d492a72b0dc7a55575914e89bedaf177.exe
-
Size
181KB
-
MD5
092cd629871089b593a564c71a86e4ba
-
SHA1
41ded81f2c77ad6f5d1a68fd716ab684d624f070
-
SHA256
20aeb22457a14a29f5ab54b61db56759d492a72b0dc7a55575914e89bedaf177
-
SHA512
454df5aa542ad28f8061db4c1c39389e11ef7ee8c00e59e51f59761404a2ee667cbb405e055bf51f94f89637e9366d32b75273ff2375d4d7508cb7dca8e15aae
-
SSDEEP
3072:3CmlA+2TGMF85+bkRG32foUP9GmPe97UoRh8ZPtzI4Z1x7NZ:SmlV4h8JG3QUz8rzVLx7NZ
Malware Config
Extracted
Family
koiloader
C2
http://81.19.141.115/marasmus.php
Attributes
-
payload_url
https://www.dsestimation.com/wp-content/uploads/2015/10
Signatures
-
Detects KoiLoader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2372-0-0x0000000000170000-0x000000000017D000-memory.dmp family_koi_loader -
Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2372-0-0x0000000000170000-0x000000000017D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2372-0-0x0000000000170000-0x000000000017D000-memory.dmpFilesize
52KB