General
-
Target
file.exe
-
Size
2.7MB
-
Sample
230209-ewffmsbg32
-
MD5
a98cf7d9ef915f3c3cb16d731eb43ff9
-
SHA1
51110199aae9e5546a8b6e29e62a0a629ab29618
-
SHA256
a3d5c655cfd386f82cae077d2db8b8c5c64eb560260eca223442f678635349f0
-
SHA512
2ad5bf1357ac2a89c78b5f7066b759924cb78a90c5643f93b05c1c0d59b8dc0b860549cfd5fbff3ef65c0c7068c2b64cea425db74afe57071c5245773b881dc8
-
SSDEEP
6144:phdPbOhpdUK5rvyKMdF2Xzw4JttcBDlxdwpfxfBThM9eo1I7u0Kry2wej993RUgV:3tbO5WKeg5fBTy9eo1drf
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10-20220901-en
Malware Config
Extracted
colibri
1.4.0
exploits
http://194.4.49.243/gate.php
Targets
-
-
Target
file.exe
-
Size
2.7MB
-
MD5
a98cf7d9ef915f3c3cb16d731eb43ff9
-
SHA1
51110199aae9e5546a8b6e29e62a0a629ab29618
-
SHA256
a3d5c655cfd386f82cae077d2db8b8c5c64eb560260eca223442f678635349f0
-
SHA512
2ad5bf1357ac2a89c78b5f7066b759924cb78a90c5643f93b05c1c0d59b8dc0b860549cfd5fbff3ef65c0c7068c2b64cea425db74afe57071c5245773b881dc8
-
SSDEEP
6144:phdPbOhpdUK5rvyKMdF2Xzw4JttcBDlxdwpfxfBThM9eo1I7u0Kry2wej993RUgV:3tbO5WKeg5fBTy9eo1drf
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-