Overview
overview
10Static
static
10Korepi/Korepi.exe
windows10-2004-x64
10Korepi/cef.js
windows10-2004-x64
1Korepi/cef...ent.js
windows10-2004-x64
1Korepi/cef...ent.js
windows10-2004-x64
1Korepi/cef...ons.js
windows10-2004-x64
1Korepi/chrome_elf.dll
windows10-2004-x64
3Korepi/d3d...47.dll
windows10-2004-x64
3Korepi/dev...ces.js
windows10-2004-x64
1Korepi/dll...lf.dll
windows10-2004-x64
3Korepi/dll...47.dll
windows10-2004-x64
3Korepi/dll/libEGL.dll
windows10-2004-x64
1Korepi/dll...v2.dll
windows10-2004-x64
3Korepi/dll/libcef.dll
windows10-2004-x64
1Korepi/ffmpeg.dll
windows10-2004-x64
1Korepi/libEGL.dll
windows10-2004-x64
1Korepi/libGLESv2.dll
windows10-2004-x64
3Korepi/libcef.dll
windows10-2004-x64
1Korepi/nat...lob.js
windows10-2004-x64
1Korepi/vgrl.dll
windows10-2004-x64
1Korepi/vivoxsdk.dll
windows10-2004-x64
1Analysis
-
max time kernel
63s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-02-2024 08:09
Behavioral task
behavioral1
Sample
Korepi/Korepi.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
Korepi/cef.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
Korepi/cef_100_percent.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral4
Sample
Korepi/cef_200_percent.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Korepi/cef_extensions.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral6
Sample
Korepi/chrome_elf.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Korepi/d3dcompiler_47.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral8
Sample
Korepi/devtools_resources.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Korepi/dll/chrome_elf.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral10
Sample
Korepi/dll/d3dcompiler_47.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
Korepi/dll/libEGL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral12
Sample
Korepi/dll/libGLESv2.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
Korepi/dll/libcef.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral14
Sample
Korepi/ffmpeg.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
Korepi/libEGL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
Korepi/libGLESv2.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
Korepi/libcef.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral18
Sample
Korepi/natives_blob.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
Korepi/vgrl.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral20
Sample
Korepi/vivoxsdk.dll
Resource
win10v2004-20231215-en
General
-
Target
Korepi/Korepi.exe
-
Size
274KB
-
MD5
6c10aa7f40c68f01050d041ab9c16417
-
SHA1
8b447164852a63f79e276396649f98dfb955e053
-
SHA256
db5cda1822fc9fa50bc6719d835d61692d936b674da3d840ba61ad1b11c616eb
-
SHA512
9636f49c03203faf53e48945efb3e182ddbcbd143822f7c706d11164d2a1a7e86caa72d3eabf307616011b79fb00b35a894dc6055a2d1cfa9966183e96a12a31
-
SSDEEP
6144:Bf+BLtABPDMZZzIlzcwKUfmBnxafTy8lI1D0zOy:uZOnKUfmBXx1DNy
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1205378577210548224/LNcoZrLKPyHLEN4pcKhtXlPWyk5g8jRNtbvhK_L1UGxjObYKgJwFG53LqgVJZWP5xjst
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 freegeoip.app 23 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Korepi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Korepi.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2356 Korepi.exe 2356 Korepi.exe 2356 Korepi.exe 2356 Korepi.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2356 Korepi.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119B
MD5cc188307ea92cce91b6046d2e1fee688
SHA1ef10d4e451d0a8d8f2fbc81ed44140607906e330
SHA256352687eb2a745c7807fb24ef681b42e310032cadffa0ee6ef4ced70cac62470d
SHA512cbafc2b7d25e82fbd85f3f66c65ba5e24a69f9b94ba7d66f57139208c49f419cd723ba568f62a290dd3cd980dc13083ff33e2804dfda2947f8723c088ab511a2
-
Filesize
393B
MD5563f0f99035b0443b3d0dd612a19ff15
SHA15156a081279ca141e2c7fee89ff188de69fbef69
SHA25617b7269db5549c858139acbf00aca6ea4484b2e6a6e6221b9600ea2fe191deea
SHA5126010965e365e76554bf3304fa039ec3385a7ef48d545576cb46d57a04d5a4c490b7fd8a71ea1a1455b7cdc4fa3975bbc47722b5284bffa316d43015dcb52dc6d
-
Filesize
756B
MD5044cd270d06124c04bc6966d5c72f3b6
SHA1cf2e95efb2adbd5a78e1af7b95aae14b98a81d5d
SHA2563cbdeaef8bbee3b5f3424965db76ff03fe98c231e99826445ad08184d06d0a89
SHA512e16952b7770a0e5e3af3e62ce5b17bd2ba67ed2ce7785869dca7bd039ec44a5e6052e9325e6e82ec51b0409987559da1c02677a8c4d77e3ea3b1f3c2a6cfe9c1
-
Filesize
1KB
MD572525073d33c542b96c6682ff5170c85
SHA19b80249c7c432358b51256dcc9c9edd4c8dc2eff
SHA2560adfd9c94905ef0c975208d35cbb094821887e306a365e98d589d3ce590a344e
SHA5122146b90d8e3adae437a6d7144e0f236ae17c486ac75a76be98a14dfbdb132dc29df05109a7b8cc9ecd8d3a53a493a6328338d55d40142dd39c66130e1145fdf3
-
Filesize
1KB
MD5ccf0551c5718ef456cd67254e10f5c7a
SHA1ca843d0919566a478dfe4154d48bfdb6aa45634b
SHA2565698491d20ced731d0ee2ffc9632a2f720e0aa6574ede2c96c035e3d6063c41f
SHA5127d6b201aab6c5bd9c31c4484da8cd171954bdd456ad807ac2593aa1c44e24c6ea475f70c5d40ff2150f4e599fb9cf8c7fbc83de3eb0199a5caabf80626c42215