2025-01-23: Fake installer leads to Koi Loader/Koi Stealer
2025-1-28 00:53:0 Author: www.malware-traffic-analysis.net(查看原文) 阅读量:7 收藏

2025-01-23 (THURSDAY): FAKE INSTALLER LEADS TO KOI LOADER/KOI STEALER

NOTES:

  • Zip files are password-protected.  Of note, this site has a new password scheme.  For the password, see the "about" page of this website.

ASSOCIATED FILES:

2025-01-23 (THURSDAY): KOI LOADER/KOI STEALER ACTIVITY

REFERENCES:

- Original article: https://www-secrss-com/articles/73274
- Translation: https://www-secrss-com.translate.goog/articles/73274?_x_tr_sl=zh-CN&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=sc

INFECTION CHAIN

- unknown source --> Windows EXE --> script-based commands retrieve and run files for Koi Loader --> Koi Stealer activity

INITIAL EXE:

- SHA256 hash: e29d2bd946212328bcdf783eb434e1b384445f4c466c5231f91a07a315484819
- File size: 2,263,752 bytes
- File name: Unknown, but Metadata has file description as "Pringle Setup"
- File type: PE32 executable (GUI) Intel 80386, for MS Windows

KOI LOADER/KOI STEALER TRAFFIC AFTER RUNNING ABOVE EXE:
 
- hxxp[:]//79.124.78[.]109/wp-includes/neocolonialXAW.php
- hxxp[:]//79.124.78[.]109/wp-includes/phyllopodan7V7GD.php
- hxxp[:]//79.124.78[.]109/wp-includes/barasinghaby.ps1
- hxxp[:]//79.124.78[.]109/wp-includes/guestwiseYtHA.exe
- hxxp[:]//79.124.78[.]109/flocking.php
- hxxp[:]//79.124.78[.]109/flocking.php
- hxxp[:]//79.124.78[.]109/flocking.php
- hxxp[:]//79.124.78[.]109/wp-includes/sd2.ps1
- hxxp[:]//79.124.78[.]109/index.php?id=&subid=zweyWGzf
- hxxp[:]//79.124.78[.]109/index.php
- hxxp[:]//79.124.78[.]109/index.php?ver=64
- hxxp[:]//79.124.78[.]109/index.php
- hxxp[:]//79.124.78[.]109/index.php
- hxxp[:]//79.124.78[.]109/index.php
- hxxp[:]//79.124.78[.]109/flocking.php
- hxxp[:]//79.124.78[.]109/flocking.php
- hxxp[:]//79.124.78[.]109/flocking.php
- hxxp[:]//79.124.78[.]109/flocking.php
- hxxp[:]//79.124.78[.]109/flocking.php
- hxxp[:]//79.124.78[.]109/flocking.php
- hxxp[:]//79.124.78[.]109/flocking.php
- hxxp[:]//79.124.78[.]109/flocking.php

  [and so on... The flocking.php URLs occur approximately every 60 seconds]

PERSISTENCE:

- Windows scheduled task:
  - Command C:\Windows\System32\wscript.exe C:\ProgramData\r6eac11b8-35d6-bffe-da50-d9e1a5ae832ar.js

PERSISTENT FILE:

- SHA256 hash: a6bda80c9f914fb5b640d3437c264993b49a91d997562d53f5ba8d32ac979ec1
- File size: 1,275 bytes
- File location: C:\ProgramData\r6eac11b8-35d6-bffe-da50-d9e1a5ae832ar.js
- File type: ASCII text, with very long lines, with CRLF line terminators
- File description: Script file made persistent through the scheduled task

FILES FROM THE C2 SERVER:

- SHA256 hash: e69c34b9bad5d700c223dd80bfa26f27eea81f2c6522986ba6a042d52f7c8b86
- File size: 7,345 bytes
- File type: ASCII text, with very long lines, with CRLF line terminators
- File location: hxxp[:]//79.124.78[.]109/wp-includes/barasinghaby.ps1

- SHA256 hash: 94bf4f12cb8929037f6ee10d424d5a7ef5f193147312e22866dce4e0d56c2143
- File size: 194,048 bytes
- File type: PE32 executable (GUI) Intel 80386, for MS Windows
- File location: hxxp[:]//79.124.78[.]109/wp-includes/guestwiseYtHA.exe

- SHA256 hash: ec04c79b87ac9542831895891f96108bd9cef11b7af54e20f65a04c99ee35610
- File size: 1,275 bytes
- File type: ASCII text, with very long lines, with CRLF line terminators
- File location: hxxp[:]//79.124.78[.]109/wp-includes/neocolonialXAW.php

- SHA256 hash: 07ddd7031ff2048a136789e6dc01212134d1ff2eacf0ece9faaf439ae2499198
- File size: 260 bytes
- File type: ASCII text, with CRLF line terminators
- File location: hxxp[:]//79.124.78[.]109/wp-includes/phyllopodan7V7GD.php

- SHA256 hash: 6c22132896a9899d9ca4f9e1845525930c348c6c92e033b3ce1344c9d25a7122
- File size: 471,794 bytes
- File type: ASCII text, with CRLF line terminators
- File location: hxxp[:]//79.124.78[.]109/wp-includes/sd2.ps1

.NET BINARY USED FOR KOI STEALER COMPONENT:

- SHA256 hash: 324216d52072da8f62c744aa1802a11dce13b60fca974c27ad2e5c53455f84e6
- File size: 77,824 bytes
- File type: PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
- File description: .NET binary decoded from section in sd2.ps1 file.

Click here to return to the main page.


文章来源: https://www.malware-traffic-analysis.net/2025/01/23/index.html
如有侵权请联系:admin#unsafe.sh