Analysis
-
max time kernel
91s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 02:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fed789b6353a0b47856963869cd0730729e72b21c08ab54ad7d4bec4f38d3da8.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
General
-
Target
fed789b6353a0b47856963869cd0730729e72b21c08ab54ad7d4bec4f38d3da8.exe
-
Size
181KB
-
MD5
6de76e8f46ff46803268219774e5de41
-
SHA1
d553c8ca4f4d9dbcc048fbe586679e53c9bc7bd7
-
SHA256
fed789b6353a0b47856963869cd0730729e72b21c08ab54ad7d4bec4f38d3da8
-
SHA512
8978687cbcf20408baae6f588595f1c58f0baf5976cf7c269987e6ed3a6309e841d8621c08c1efbfd2c3aecfc73c06a6d453463e09f601c73f3f0986b9adf262
-
SSDEEP
3072:HCmlA+2TGMF85+bkRG32foUP9GmPe97Uoduqn+HaxAdbAqR/gTDTdJip9NZ:imlV4h8JG3QUzduqn+HaGdbD/Mf+/NZ
Malware Config
Extracted
Family
koiloader
C2
http://45.86.162.187/overapplaud.php
Attributes
-
payload_url
https://www.crowcrm.eu/adserver/docs/images
Signatures
-
Detects KoiLoader payload 1 IoCs
resource yara_rule behavioral2/memory/4788-0-0x0000000000F40000-0x0000000000F4D000-memory.dmp family_koi_loader -
Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) 1 IoCs
resource yara_rule behavioral2/memory/4788-0-0x0000000000F40000-0x0000000000F4D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM