#KoiLoader

2025-05-09 (Friday): #KoiLoader / #KoiStealer activity still happens. It's the same type of distribution chain and infection characteristics as always.

Example of downloaded zip archive available at:

- bazaar.abuse.ch/sample/3523653
- tria.ge/250510-a2fw5sek3y
- app.any.run/tasks/3adefb51-8ab

List of several URLs seen recently that return a zip archive containing a Windows shortcut for Koi Loader / Koi Stealer.Screenshot of a web browser when downloading one of the zip archives for Koi Loader / Koi Stealer from one of the Google Sites URLs.Examining the Windows shortcut extracted from the downloaded zip archive. The shortcut runs PowerShell script to infect a host with Koi Loader / Koi Stealer.Traffic from a Koi Loader / Koi Stealer infection filtered in Wireshark.

2025-01-23 (Thursday): Windows EXE impersonating an installer submitted to VT on 2024-11-29 leads to #KoiLoader / #KoiStealer infection. A #pcap of the infection traffic, the associated malware/artifacts, and some of the indicators are available at malware-traffic-analysis.net/2

I normally see Koi Loader/Stealer infection chains starting with zip-ed Windows shortcuts (.lnk files) from malicious sites[.]google[.]com URLs. This one started with a Windows EXE that caused the same type of PowerShell command line for Koi Loader/Stealer that I always see from those .lnk files.

Found the EXE to kick off this chain from a report by someone at the An Xin Threat Intelligence Center at: secrss.com/articles/73274

English ranslation: www-secrss-com.translate.goog/

2025-01-21 (Tuesday): Quick post with a #pcap, malware/artifacts and IOCs for #KoiLoader / #KoiStealer activity at malware-traffic-analysis.net/2

Screenshot of the web page hosting the quick post for Koi Loader/Koi Stealer activity listing the IOCs, pcap, and malware/artifacts.
D3LabD3Lab
2024-06-21

Campagne Week 25

☠️💣🔥👻
: Pagamento
: Ordine
: AgenziaEntrate
- : Resend
: Pagamenti
: Ordini

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst