General

  • Target

    chase_statement_march.zip

  • Size

    919B

  • Sample

    250321-v3sbsatyfz

  • MD5

    a93e3c163820bc0d6bf9dbd1213f4944

  • SHA1

    04a6703d396aaa93f983707f5e4cb16354831998

  • SHA256

    dd56d8d92b125dc1cbd12a164274adf032f2053bfa5ac48c39e645fa1b61400f

  • SHA512

    3a2a7d0ee9336ec02a6f6c687cd23807aabea03570fbfee1a26479b7dd8239b0ef06a6345d21d668d218a162a30118112668851d62b489cf10f16924ae856506

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://casettalecese.it/wp-content/uploads/2022/10

Extracted

Family

koiloader

C2

http://94.247.42.253/pilot.php

Attributes
  • payload_url

    https://casettalecese.it/wp-content/uploads/2022/10

Targets

    • Target

      chase_statement_march.lnk

    • Size

      1KB

    • MD5

      202ee916a0113699880cc2e48a73d353

    • SHA1

      85d9b74b2afa5bf0320e746a2871ef614159db2e

    • SHA256

      02f27282ecc90843bd932d731c87426f78e4f88d79c66374ae06c6d1641c73cb

    • SHA512

      c729137c2680e98e9686d6a2368e184fc38897032d0d0bf1e1c5a84530cc45208bfc60085be768c027d4ce52b627a7f308458ac5ed480c32289bc5a0d7c0a35e

    • KoiLoader

      KoiLoader is a malware loader written in C++.

    • Koiloader family

    • Detects KoiLoader payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Indicator Removal: Clear Persistence

      Clear artifacts associated with previously established persistence like scheduletasks on a host.

MITRE ATT&CK Enterprise v15

Tasks