General
-
Target
dd56d8d92b125dc1cbd12a164274adf032f2053bfa5ac48c39e645fa1b61400f.zip
-
Size
919B
-
Sample
250322-emsdvaxwhw
-
MD5
a93e3c163820bc0d6bf9dbd1213f4944
-
SHA1
04a6703d396aaa93f983707f5e4cb16354831998
-
SHA256
dd56d8d92b125dc1cbd12a164274adf032f2053bfa5ac48c39e645fa1b61400f
-
SHA512
3a2a7d0ee9336ec02a6f6c687cd23807aabea03570fbfee1a26479b7dd8239b0ef06a6345d21d668d218a162a30118112668851d62b489cf10f16924ae856506
Static task
static1
Behavioral task
behavioral1
Sample
chase_statement_march.lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
chase_statement_march.lnk
Resource
win10v2004-20250314-en
Malware Config
Extracted
https://casettalecese.it/wp-content/uploads/2022/10
Extracted
koiloader
http://94.247.42.253/pilot.php
-
payload_url
https://casettalecese.it/wp-content/uploads/2022/10
Targets
-
-
Target
chase_statement_march.lnk
-
Size
1KB
-
MD5
202ee916a0113699880cc2e48a73d353
-
SHA1
85d9b74b2afa5bf0320e746a2871ef614159db2e
-
SHA256
02f27282ecc90843bd932d731c87426f78e4f88d79c66374ae06c6d1641c73cb
-
SHA512
c729137c2680e98e9686d6a2368e184fc38897032d0d0bf1e1c5a84530cc45208bfc60085be768c027d4ce52b627a7f308458ac5ed480c32289bc5a0d7c0a35e
Score10/10-
Koiloader family
-
Detects KoiLoader payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Indicator Removal: Clear Persistence
Clear artifacts associated with previously established persistence like scheduletasks on a host.
-