General
-
Target
Komar Client.exe
-
Size
7.6MB
-
Sample
250201-vvpwpatqhn
-
MD5
777016b76fe96ee46aa60c70086760cc
-
SHA1
258707ce944fbe294051acb08f6137e96a584e36
-
SHA256
6b1c0d64164ae8a638ab185b45f5f5f602ed51e7c58671c168e40b41d99b8cc3
-
SHA512
db5a8b10b4892859b8f74ba369c7f29e5cb0dbf64d05dc1fd44db8811b38a4ab581379e19e8e2b09877ccc41b29e1618235a06220d35f2676b7d1807b257860f
-
SSDEEP
196608:iCD+kdjjHwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNW/:d5lMIHL7HmBYXrYoaUN4
Behavioral task
behavioral1
Sample
Komar Client.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Komar Client.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
>���d$.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
>���d$.pyc
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
Komar Client.exe
-
Size
7.6MB
-
MD5
777016b76fe96ee46aa60c70086760cc
-
SHA1
258707ce944fbe294051acb08f6137e96a584e36
-
SHA256
6b1c0d64164ae8a638ab185b45f5f5f602ed51e7c58671c168e40b41d99b8cc3
-
SHA512
db5a8b10b4892859b8f74ba369c7f29e5cb0dbf64d05dc1fd44db8811b38a4ab581379e19e8e2b09877ccc41b29e1618235a06220d35f2676b7d1807b257860f
-
SSDEEP
196608:iCD+kdjjHwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNW/:d5lMIHL7HmBYXrYoaUN4
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
>���d$.pyc
-
Size
1KB
-
MD5
724d79eb70573cc127f6b9fa85beef96
-
SHA1
e813e0d03d76c51aa18903eb42df2e63110a0c71
-
SHA256
99142e6ce63206e2ffa918684cd621e727a1c7f91c10148b5199a5569770674d
-
SHA512
01899b6ed320af22a4eb37a7f01369bbbeb042c19c19dc939b6b34955164b7206b8c4f0ef6424d1b2cf6ce5c52009985487f11900e8030922bd7192357d51c58
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3