Overview
overview
10Static
static
10Korepi.rar
windows10-1703-x64
10Korepi/Korepi.exe
windows10-1703-x64
10Korepi/chr...nt.pak
windows10-1703-x64
3Korepi/chr...nt.pak
windows10-1703-x64
3Korepi/con...ig.xml
windows10-1703-x64
1Korepi/con...es.pdb
windows10-1703-x64
3Korepi/d3d...47.dll
windows10-1703-x64
3Korepi/d4d...er.xml
windows10-1703-x64
1Korepi/dll/ffmpeg.dll
windows10-1703-x64
1Korepi/dll/libEGL.dll
windows10-1703-x64
1Korepi/dll...v2.dll
windows10-1703-x64
3Korepi/dll...er.dll
windows10-1703-x64
3Korepi/dll...d.json
windows10-1703-x64
3Korepi/dll...-1.dll
windows10-1703-x64
3Korepi/ffmpeg.dll
windows10-1703-x64
1Korepi/icudtl.dat
windows10-1703-x64
3Korepi/libEGL.dll
windows10-1703-x64
1Korepi/libGLESv2.dll
windows10-1703-x64
3Korepi/system.yaml
windows10-1703-x64
3Korepi/sys...gl.pdb
windows10-1703-x64
3Korepi/vgrl.dll
windows10-1703-x64
1Korepi/vivoxsdk.dll
windows10-1703-x64
1Analysis
-
max time kernel
126s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20231220-en -
resource tags
arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system -
submitted
08-02-2024 19:33
Behavioral task
behavioral1
Sample
Korepi.rar
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
Korepi/Korepi.exe
Resource
win10-20231220-en
Behavioral task
behavioral3
Sample
Korepi/chrome_100_percent.pak
Resource
win10-20231215-en
Behavioral task
behavioral4
Sample
Korepi/chrome_200_percent.pak
Resource
win10-20231215-en
Behavioral task
behavioral5
Sample
Korepi/config/config.xml
Resource
win10-20231215-en
Behavioral task
behavioral6
Sample
Korepi/config/resources.pdb
Resource
win10-20231215-en
Behavioral task
behavioral7
Sample
Korepi/d3dcompiler_47.dll
Resource
win10-20231215-en
Behavioral task
behavioral8
Sample
Korepi/d4dcompiler.xml
Resource
win10-20231215-en
Behavioral task
behavioral9
Sample
Korepi/dll/ffmpeg.dll
Resource
win10-20231220-en
Behavioral task
behavioral10
Sample
Korepi/dll/libEGL.dll
Resource
win10-20231215-en
Behavioral task
behavioral11
Sample
Korepi/dll/libGLESv2.dll
Resource
win10-20231215-en
Behavioral task
behavioral12
Sample
Korepi/dll/vk_swiftshader.dll
Resource
win10-20231215-en
Behavioral task
behavioral13
Sample
Korepi/dll/vk_swiftshader_icd.json
Resource
win10-20231220-en
Behavioral task
behavioral14
Sample
Korepi/dll/vulkan-1.dll
Resource
win10-20231215-en
Behavioral task
behavioral15
Sample
Korepi/ffmpeg.dll
Resource
win10-20231215-en
Behavioral task
behavioral16
Sample
Korepi/icudtl.dat
Resource
win10-20231215-en
Behavioral task
behavioral17
Sample
Korepi/libEGL.dll
Resource
win10-20231215-en
Behavioral task
behavioral18
Sample
Korepi/libGLESv2.dll
Resource
win10-20231215-en
Behavioral task
behavioral19
Sample
Korepi/system.yaml
Resource
win10-20231215-en
Behavioral task
behavioral20
Sample
Korepi/systemlibegl.pdb
Resource
win10-20231215-en
Behavioral task
behavioral21
Sample
Korepi/vgrl.dll
Resource
win10-20231215-en
Behavioral task
behavioral22
Sample
Korepi/vivoxsdk.dll
Resource
win10-20231215-en
General
-
Target
Korepi/Korepi.exe
-
Size
274KB
-
MD5
efa2b41e3fad6f9748f69cee22300fd8
-
SHA1
9989d14b2b6876f53969ca4346109fd377013a71
-
SHA256
f8caf6d4c0c782dc6f40399a72286412dba50c081c38efee96417910516e0123
-
SHA512
2bca7353443a8e771abdd71780545f08e20d9231161802a7d838860f6149c07bf912142cf2c2def98439ee3d8904c65fb7f0a2f229dcf73575270062c3f60ec6
-
SSDEEP
6144:Af+BLtABPDLgj1xw1eO5rbMMzhgUsYqTXGRFafTyElI1D05KJ:r161eO5rbHHsYqTXGtp1DDJ
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1204820036871651418/CUplXl5h8mK8wayRD4L98BI20GJlZ7pUqazPKIFG3k71PQZAQLEztS-LsGq873wkB2Tf
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 freegeoip.app 2 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Korepi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Korepi.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2196 Korepi.exe 2196 Korepi.exe 2196 Korepi.exe 2196 Korepi.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2196 Korepi.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
743B
MD522dcac4eca1ee824acc2ef1ade48bbe1
SHA162ed46092a23ee04bd0a7e470cfc04f65bb271a3
SHA2564f310e52c391e72905b9c605e7fef8d6b1296741b667e3c58920e670a3d02f70
SHA5129799b02537087e61d28052795aa7a2155732e04f1d79b0f524e1dfed639188d9ca5b69711a5334875583e22f12abb402ead7c4e14944ebc081774e3322b34cf7
-
Filesize
1KB
MD5eb5d1be57bed8e241888741766080250
SHA1c65ef82db69bc0e711c9346e49a7c7c6d46c077d
SHA25699c968b3b9521e38d148eff8507eb4f2e8d9fe51e96ba5bb7ce239208f2af515
SHA51269985b66797f203ef7c9c3014d8681053c504dfcdc345edb4604e7cf4a25299bbe50afe61fc0543eeb7c18fa3684a0b5d1617b77ef22a5d0858d2f105aefd2c6