Resubmissions
29/11/2022, 17:56
221129-wjef9aeh81 1007/07/2022, 12:21
220707-pjry1sabg2 1021/08/2021, 14:02
210821-e56bctg12a 8Analysis
-
max time kernel
53s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07/07/2022, 12:21
Static task
static1
Behavioral task
behavioral1
Sample
53e982e656f91d263494170d71228e6d98c026a23293fbb70176531794d149c0.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
53e982e656f91d263494170d71228e6d98c026a23293fbb70176531794d149c0.exe
-
Size
6.2MB
-
MD5
a56fea310f3cf5e724ee4a9990047b78
-
SHA1
d697340615fdb8eedd29cffd0de9ad64fef6c9c9
-
SHA256
53e982e656f91d263494170d71228e6d98c026a23293fbb70176531794d149c0
-
SHA512
6eabf12efaae5a0493298d44cfb6bf07646064569e055c5e88b61637b97742d7b98105f1e4da6304101db9659b427e64eb0a8646cfaab674e3b607fae46abf2e
Malware Config
Extracted
Family
colibri
C2
http://80.92.205.102/gate.php
Signatures
-
resource yara_rule behavioral1/memory/1944-54-0x0000000000400000-0x00000000015C7000-memory.dmp vmprotect behavioral1/memory/1944-56-0x0000000000400000-0x00000000015C7000-memory.dmp vmprotect behavioral1/memory/1944-62-0x0000000000400000-0x00000000015C7000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1944 53e982e656f91d263494170d71228e6d98c026a23293fbb70176531794d149c0.exe 1944 53e982e656f91d263494170d71228e6d98c026a23293fbb70176531794d149c0.exe