General
-
Target
chase_march_2025.zip
-
Size
905B
-
Sample
250402-l462wsxpv3
-
MD5
b810c659d1103dcaf836d8d647b8a03b
-
SHA1
2b813ae81e3330e6315760eee29ac533b42c7346
-
SHA256
3bfb486ba3651881de7009679dbbdc68b685612a72c3c051305699efaa1fe5cb
-
SHA512
5df60c8817f4553b90e60675ea021bc59345733645b7d27909c45fa7a58ee2da33f1465b687b3abc9fd2d004f1c3fecced9e9c43c3b27488fafe337160f9ea4d
Static task
static1
Behavioral task
behavioral1
Sample
chase_march_2025.lnk
Resource
win10v2004-20250313-en
Malware Config
Extracted
https://studiolegaledesanctis.eu/wp-content/uploads/2024/07
Extracted
koiloader
http://217.156.66.15/gnathopoda.php
-
payload_url
https://studiolegaledesanctis.eu/wp-content/uploads/2024/07
Targets
-
-
Target
chase_march_2025.lnk
-
Size
1KB
-
MD5
c8819ed5f7f4a9b309e01db14b458a60
-
SHA1
1b78c2b3627814971f73c7fa2696d1119154ea07
-
SHA256
5d736786036eeeaeb7a7c8b3652c76ca4c61a845619004e0b9bb679971da6a48
-
SHA512
72e7d619453b60df925f2f593bb9ff3156c717e97354f1de6025f9de67c8ec7713dccc01988928072b271f20eca35168023fed06f084376db47b2a07be424f78
Score10/10-
Koiloader family
-
Detects KoiLoader payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Indicator Removal: Clear Persistence
Clear artifacts associated with previously established persistence like scheduletasks on a host.
-