Overview
overview
10Static
static
7kolebot/da...er.exe
windows7-x64
7kolebot/da...er.exe
windows10-2004-x64
10kolebot/da...le.dll
windows7-x64
7kolebot/da...le.dll
windows10-2004-x64
10kolebot/dat/psapi.dll
windows7-x64
1kolebot/dat/psapi.dll
windows10-2004-x64
10kolebot/kole.exe
windows7-x64
7kolebot/kole.exe
windows10-2004-x64
10kolebot/we...ea.url
windows7-x64
6kolebot/we...ea.url
windows10-2004-x64
10kolebot/we...ot.url
windows7-x64
6kolebot/we...ot.url
windows10-2004-x64
10kolebot/we...le.url
windows7-x64
6kolebot/we...le.url
windows10-2004-x64
10Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:27
Behavioral task
behavioral1
Sample
kolebot/dat/klauncher.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
kolebot/dat/klauncher.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
kolebot/dat/kmodule.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
kolebot/dat/kmodule.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
kolebot/dat/psapi.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
kolebot/dat/psapi.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
kolebot/kole.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
kolebot/kole.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
kolebot/website/GameCrea.url
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
kolebot/website/GameCrea.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
kolebot/website/Kolebot.url
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
kolebot/website/Kolebot.url
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
kolebot/website/OnlineHile.url
Resource
win7-20231129-en
General
-
Target
kolebot/dat/psapi.dll
-
Size
22KB
-
MD5
c24d2a8da25295117dc31d423a146fa5
-
SHA1
fa6dcb66cb9601bf78aef140dcd00b8bde779bec
-
SHA256
04e53276c1ecdf0017eef86d8281db6b899dcc58318da3452dec6aeb793b9d7f
-
SHA512
27ba97532c7293e3eaf07e8ae482b79072ddc5456de8fb1a1baa7e023295cb0e99ce5d6cd0b9a657555c85eb089c90d96a8eb1b7e46a895aa1d94086ad434d26
-
SSDEEP
384:rnIgBApSLPuSO6lDA85aZsaA6hfMl0f1DSneOV+o4CXqR7yAuyOosmMLoWZjPAWZ:8gOSROSOZ9Mef1CDSRu3vP4
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4768 wrote to memory of 4324 4768 rundll32.exe 39 PID 4768 wrote to memory of 4324 4768 rundll32.exe 39 PID 4768 wrote to memory of 4324 4768 rundll32.exe 39