General
-
Target
Virs1.exe
-
Size
1.4MB
-
Sample
241006-mk4m4atdnc
-
MD5
272ce51163d36007d848281cb03e5fc7
-
SHA1
2f9b35209bf3d91cf14ca23aee64e31d684e9d26
-
SHA256
f0991ff0c9379130adfc31152ec55c1925872f0c664ab34df90cb2d730c0bf63
-
SHA512
955087c98ae98e51351b5c41cc83f39dc23c9f60658791bb3f83c5ba65b82fd601fe457c514dea73aa422f59b1806a55f576c66d52e4b5fec29fefd0f260fe1f
-
SSDEEP
24576:iZ1xuVVjfFoynPaVBUR8f+kN10EBJw5vgHWjTwAlocaKjyyItHDzY:iQDgok30JrLocaKjGq
Behavioral task
behavioral1
Sample
Virs1.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Sazan
tm6bqni.localto.net:1511
DC_MUTEX-8K1U6CF
-
gencode
phCnNGEAkXoi
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
Virs1.exe
-
Size
1.4MB
-
MD5
272ce51163d36007d848281cb03e5fc7
-
SHA1
2f9b35209bf3d91cf14ca23aee64e31d684e9d26
-
SHA256
f0991ff0c9379130adfc31152ec55c1925872f0c664ab34df90cb2d730c0bf63
-
SHA512
955087c98ae98e51351b5c41cc83f39dc23c9f60658791bb3f83c5ba65b82fd601fe457c514dea73aa422f59b1806a55f576c66d52e4b5fec29fefd0f260fe1f
-
SSDEEP
24576:iZ1xuVVjfFoynPaVBUR8f+kN10EBJw5vgHWjTwAlocaKjyyItHDzY:iQDgok30JrLocaKjGq
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-