Analysis
-
max time kernel
91s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2023, 06:49
Behavioral task
behavioral1
Sample
53e982e656f91d263494170d71228e6d98c026a23293fbb70176531794d149c0.exe
Resource
win7-20221111-en
3 signatures
150 seconds
General
-
Target
53e982e656f91d263494170d71228e6d98c026a23293fbb70176531794d149c0.exe
-
Size
6.2MB
-
MD5
a56fea310f3cf5e724ee4a9990047b78
-
SHA1
d697340615fdb8eedd29cffd0de9ad64fef6c9c9
-
SHA256
53e982e656f91d263494170d71228e6d98c026a23293fbb70176531794d149c0
-
SHA512
6eabf12efaae5a0493298d44cfb6bf07646064569e055c5e88b61637b97742d7b98105f1e4da6304101db9659b427e64eb0a8646cfaab674e3b607fae46abf2e
-
SSDEEP
98304:z6PXpOFSNuslLa33jj2hVHpthmF+kxjg8alBMmhhEKYoMst3zeD3Yxu7he:z6cSNuslK+7HpOJg8EMmhhEKVMsFxuNe
Malware Config
Extracted
Family
colibri
C2
http://80.92.205.102/gate.php
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/1556-132-0x0000000000400000-0x00000000015C7000-memory.dmp vmprotect behavioral2/memory/1556-134-0x0000000000400000-0x00000000015C7000-memory.dmp vmprotect behavioral2/memory/1556-135-0x0000000000400000-0x00000000015C7000-memory.dmp vmprotect behavioral2/memory/1556-140-0x0000000000400000-0x00000000015C7000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1556 53e982e656f91d263494170d71228e6d98c026a23293fbb70176531794d149c0.exe 1556 53e982e656f91d263494170d71228e6d98c026a23293fbb70176531794d149c0.exe 1556 53e982e656f91d263494170d71228e6d98c026a23293fbb70176531794d149c0.exe 1556 53e982e656f91d263494170d71228e6d98c026a23293fbb70176531794d149c0.exe