Analysis
-
max time kernel
183s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 04:28
Behavioral task
behavioral1
Sample
0e78df69265dc57c37673bdee540ce2f.exe
Resource
win7-20231129-en
3 signatures
150 seconds
General
-
Target
0e78df69265dc57c37673bdee540ce2f.exe
-
Size
6.3MB
-
MD5
0e78df69265dc57c37673bdee540ce2f
-
SHA1
a1231f08b5fca28fa29b6c9621cf01c4e82f3d95
-
SHA256
6b74dc043f9a12823ed98d704e4c8543c9b5d8b9240e65e9d31d2303ab914906
-
SHA512
5fadb364171434da14d9eeb608bea23ea1278a5a871c9613fdf97ac2bcf19d701b24d5bd85cc138a9cfd0226bac7babd2c46a7dedb70326f7bb57ff88dc084b0
-
SSDEEP
196608:zfija2TcwZTDVO2Z6+CTV69Vd8hhWTGPr4uDt7T:GDOMCTQ4hhuE4uDxT
Malware Config
Extracted
Family
colibri
C2
http://94.103.80.169/gate.php
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/1576-4-0x0000000000400000-0x00000000015F1000-memory.dmp vmprotect behavioral2/memory/1576-8-0x0000000000400000-0x00000000015F1000-memory.dmp vmprotect behavioral2/memory/1576-15-0x0000000000400000-0x00000000015F1000-memory.dmp vmprotect behavioral2/memory/1576-17-0x0000000000400000-0x00000000015F1000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1576 0e78df69265dc57c37673bdee540ce2f.exe 1576 0e78df69265dc57c37673bdee540ce2f.exe 1576 0e78df69265dc57c37673bdee540ce2f.exe 1576 0e78df69265dc57c37673bdee540ce2f.exe