General

  • Target

    cb940cf74606d64260e36e8ef1e4f585.exe

  • Size

    602KB

  • Sample

    220903-m59d3sdhan

  • MD5

    cb940cf74606d64260e36e8ef1e4f585

  • SHA1

    0c77a9b9c592ee4d9e2757e5774d6621a77b0c0d

  • SHA256

    adbee90a8f97d2afdc7829c01bc78af630b7f567270bcc5a5ff56e0469033b9f

  • SHA512

    7701f4295101d197dc7b6529d0d772596a93ee2a1d4e063bc3793856114e13cf0ea30c8527739e88e6b4de2f4891b7e2a4f4e3ee8cec5003290100abac33cfbf

  • SSDEEP

    12288:FThQ8oNPBa/AqpCeBXTy1t2r4BRnExdaqA:I8oNQXpCCB

Malware Config

Extracted

Family

colibri

Version

1.2.0

Botnet

Build1

C2

http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php

http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php

Targets

    • Target

      cb940cf74606d64260e36e8ef1e4f585.exe

    • Size

      602KB

    • MD5

      cb940cf74606d64260e36e8ef1e4f585

    • SHA1

      0c77a9b9c592ee4d9e2757e5774d6621a77b0c0d

    • SHA256

      adbee90a8f97d2afdc7829c01bc78af630b7f567270bcc5a5ff56e0469033b9f

    • SHA512

      7701f4295101d197dc7b6529d0d772596a93ee2a1d4e063bc3793856114e13cf0ea30c8527739e88e6b4de2f4891b7e2a4f4e3ee8cec5003290100abac33cfbf

    • SSDEEP

      12288:FThQ8oNPBa/AqpCeBXTy1t2r4BRnExdaqA:I8oNQXpCCB

    • Colibri Loader

      A loader sold as MaaS first seen in August 2021.

    • Detectes Phoenix Miner Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks