Overview
This post will cover at a high level the attack chain that Koi Loader takes in order to deploy Koi stealer on a system. All artifacts and samples were retrieved from Malware Traffic.
Fake Installer Initial Execution
Fake Installer
Initial access for this sample took form of a digitally