Analysis
-
max time kernel
104s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 14:44
Static task
static1
1 signatures
General
-
Target
supraoesophagealYdF.exe
-
Size
231KB
-
MD5
3826d6e4578b3fcf87accf5b7979103d
-
SHA1
47aa90bb8ac56a4a697e6750a4a980669d36a8aa
-
SHA256
7352af121cb003e2da20897a5da8f3bbb74e15294bbbb6223344318fb731f93a
-
SHA512
a88f1f13f9d2e1d63dac4266c65f8b5c8fc1e3b6aec8264924f3400ca63f5ce25eca041d2f092cbcab5a5b00f94131df15c741bc6b17dd162a0b309a97187942
-
SSDEEP
3072:BNwCrquaP24/h7Q22oWvjWn+V4t4jrv34CovCWfhalxqlemcosuF07SCv:/UhAoAZoLfhavql9copFBCv
Malware Config
Extracted
Family
koiloader
C2
http://217.156.66.15/gnathopoda.php
Attributes
-
payload_url
https://studiolegaledesanctis.eu/wp-content/uploads/2024/07
Signatures
-
Koiloader family
-
Detects KoiLoader payload 1 IoCs
resource yara_rule behavioral1/memory/4952-0-0x0000000001280000-0x000000000128D000-memory.dmp family_koi_loader -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language supraoesophagealYdF.exe