MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4c6f0294b0ede5a8663a2186bf2368e243d03c94b3b91d851b03a9562b5594d3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Kimsuky


Vendor detections: 8


Intelligence 8 IOCs YARA 3 File information Comments

SHA256 hash: 4c6f0294b0ede5a8663a2186bf2368e243d03c94b3b91d851b03a9562b5594d3
SHA3-384 hash: c6d614401888a6bf56c2c3a214e1b1d791cf1026ff2b30f8d1b0944065c72bcd11ee32e0c26fd7c8e40ee0a4d8409ca8
SHA1 hash: 1c49031f8de940111e4744e99fd924c9210ffc0b
MD5 hash: 3c952bca6851f14fb56fd4dd2f6f5658
humanhash: orange-victor-oven-thirteen
File name:4c6f0294b0ede5a8663a2186bf2368e243d03c94b3b91d851b03a9562b5594d3
Download: download sample
Signature Kimsuky
File size:596'480 bytes
First seen:2022-03-18 09:49:56 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 3536e24236cd3c3dd884745c989942d3 (1 x Kimsuky)
ssdeep 12288:eS3M56q1T5Nhyz/B1B12g3uRWcgT1rSRg1wyyBOj4lK:p856qlhyDPv2suq5ramj
Threatray 6'061 similar samples on MalwareBazaar
TLSH T10EC423C31EC8443FF84AC7B0E66DC82C7E5469719AE2DE397355DA094BB26E23C6B405
Reporter JAMESWT_WT
Tags:dll Kimsuky

Intelligence


File Origin
# of uploads :
1
# of downloads :
148
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Creating a process with a hidden window
Creating a file in the %AppData% subdirectories
Running batch commands
Using the Windows Management Instrumentation requests
Launching a tool to kill processes
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
explorer.exe packed winnti
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Detected VMProtect packer
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Call by Ordinal
Sigma detected: Suspicious Remote Thread Created
Sigma detected: Suspicious Svchost Process
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 592310 Sample: 0LOMkjUDlc Startdate: 18/03/2022 Architecture: WINDOWS Score: 100 99 mail2.daum.net 2->99 101 mail.daum.net 2->101 103 2 other IPs or domains 2->103 113 Malicious sample detected (through community Yara rule) 2->113 115 Multi AV Scanner detection for dropped file 2->115 117 Multi AV Scanner detection for submitted file 2->117 119 7 other signatures 2->119 11 rundll32.exe 2->11         started        13 loaddll32.exe 1 2->13         started        15 rundll32.exe 2->15         started        signatures3 process4 process5 17 rundll32.exe 11->17         started        20 cmd.exe 1 13->20         started        22 rundll32.exe 1 6 13->22         started        24 rundll32.exe 6 13->24         started        26 rundll32.exe 13->26         started        28 rundll32.exe 15->28         started        signatures6 105 Writes to foreign memory regions 17->105 107 Allocates memory in foreign processes 17->107 109 Injects a PE file into a foreign processes 17->109 30 svchost.exe 17->30         started        45 2 other processes 17->45 33 rundll32.exe 6 20->33         started        111 Found evasive API chain (trying to detect sleep duration tampering with parallel thread) 22->111 35 cmd.exe 1 22->35         started        37 WerFault.exe 23 9 22->37         started        47 2 other processes 24->47 39 cmd.exe 1 26->39         started        41 WerFault.exe 26->41         started        43 svchost.exe 28->43         started        process7 signatures8 121 Writes to foreign memory regions 30->121 123 Allocates memory in foreign processes 30->123 125 Injects a PE file into a foreign processes 30->125 49 iexplore.exe 30->49         started        52 iexplore.exe 30->52         started        59 7 other processes 30->59 54 rundll32.exe 7 33->54         started        57 cmd.exe 1 33->57         started        61 2 other processes 33->61 63 2 other processes 35->63 65 2 other processes 39->65 67 2 other processes 47->67 process9 dnsIp10 85 logins-ltm0w7xt.kgslb.com 211.231.99.19, 443, 49784, 49790 KAKAO-AS-KRKakaoCorpKR Korea Republic of 49->85 87 mail2.daum.net 211.249.220.136, 443, 49773, 49774 DAUM-ASKakaoCorpKR Korea Republic of 49->87 93 2 other IPs or domains 49->93 89 192.168.2.1 unknown unknown 52->89 95 2 other IPs or domains 52->95 81 C:\Users\user\AppData\...\SysCertUpdate.dll, PE32 54->81 dropped 83 C:\...\SysCertUpdate.dll:Zone.Identifier, ASCII 54->83 dropped 69 cmd.exe 54->69         started        71 WerFault.exe 54->71         started        73 taskkill.exe 1 57->73         started        75 conhost.exe 57->75         started        91 211.231.99.82, 443, 49830, 49835 KAKAO-AS-KRKakaoCorpKR Korea Republic of 59->91 97 12 other IPs or domains 59->97 file11 process12 process13 77 taskkill.exe 1 69->77         started        79 conhost.exe 69->79         started       
Threat name:
Win32.Trojan.Kimsuky
Status:
Malicious
First seen:
2022-01-12 07:36:00 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
21 of 27 (77.78%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence spyware stealer vmprotect
Behaviour
Enumerates processes with tasklist
Gathers network information
Gathers system information
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Reads user/profile data of web browsers
VMProtect packed file
Unpacked files
SH256 hash:
a533edd061b39d43a3603c77664d25ad02b31bd986b382e715ed42daedbeecc6
MD5 hash:
8ae0aebb0a2ff90c9e6fdd959cd53688
SHA1 hash:
f6778c07bb4bc7e1e1d4b8a9765db780654d6071
SH256 hash:
69ae7691a7a7280cc56c0d7322c8f4db548e516e34701f2d71a2ac6c239ca1b5
MD5 hash:
3c308dd92867fa93809140508a6c5a05
SHA1 hash:
952a79806c3196c8845ce0c02d2e0b779b2be70c
SH256 hash:
4c6f0294b0ede5a8663a2186bf2368e243d03c94b3b91d851b03a9562b5594d3
MD5 hash:
3c952bca6851f14fb56fd4dd2f6f5658
SHA1 hash:
1c49031f8de940111e4744e99fd924c9210ffc0b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.
Rule name:Winnti_NlaifSvc
Author:Florian Roth
Description:Winnti sample - file NlaifSvc.dll
Reference:https://goo.gl/VbvJtL
Rule name:Winnti_NlaifSvc_RID2CFF
Author:Florian Roth
Description:Winnti sample - file NlaifSvc.dll
Reference:https://goo.gl/VbvJtL

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments