MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c600dd34854aa5c6c97ed8c1c92d28034d661652b4d892d223b6805a4e864622. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: c600dd34854aa5c6c97ed8c1c92d28034d661652b4d892d223b6805a4e864622
SHA3-384 hash: 2b11a8ac09fa7ae0b3c4bd2e3c7daf1a529d244e25e73452c3665246028fcbf78c6b1e2652567f01713adfcb6a599c61
SHA1 hash: ad388fa1cc0bec1fc45b30a460c53c56789bb11d
MD5 hash: b587a6af7fd86eeb42425913b8d73d47
humanhash: march-idaho-fifteen-twenty
File name:VirtManage
Download: download sample
File size:10'522'168 bytes
First seen:2025-03-08 01:32:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f4639a0b3116c2cfc71144b88a929cfd (117 x GuLoader, 55 x Formbook, 40 x VIPKeylogger)
ssdeep 196608:wIUdeDRpCmYAU2A5cwMuMM0VAbknaHSXKGvNYY1S95CFzeyQa0J6C:wXde+0Q0VOknaHSXKGKR94hQ5v
TLSH T109B6336C20EA61C3D76277F9ABA6543FCE22516642E27C0E075E7B04192FFE0FC19A51
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10522/11/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon 656de9096d696869
Reporter SquiblydooBlog
Tags:exe FORTUNE PRINT CENTRE LIMITED signed

Code Signing Certificate

Organisation:FORTUNE PRINT CENTRE LIMITED
Issuer:GlobalSign GCC R45 EV CodeSigning CA 2020
Algorithm:sha256WithRSAEncryption
Valid from:2025-01-10T14:37:19Z
Valid to:2026-01-11T14:37:19Z
Serial number: 16668bf1446c1c20f26be641
Intelligence: 6 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 8f536be64106a9c7dfdc41161bc5eda4a7eb80bdf1d6cf13fb6dfd3356b467d5
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
470
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
VirtManage
Verdict:
Malicious activity
Analysis date:
2025-03-08 01:35:19 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
93.3%
Tags:
shellcode vmdetect sage blic
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Creating a file
Creating a file in the %temp% subdirectories
Searching for the Windows task manager window
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the %AppData% subdirectories
Launching a process
Сreating synchronization primitives
Searching for synchronization primitives
DNS request
Sending a UDP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
adaptive-context installer microsoft_visual_cc overlay signed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Driver Support
Verdict:
Suspicious
Result
Threat name:
n/a
Detection:
malicious
Classification:
expl.evad
Score:
42 / 100
Signature
.NET source code contains a domain name check
Antivirus detection for dropped file
Encrypted powershell cmdline option found
Loading BitLocker PowerShell Module
Multi AV Scanner detection for dropped file
Obfuscated command line found
Sigma detected: Dot net compiler compiles file from suspicious location
Suspicious powershell command line found
Uses whoami command line tool to query computer and username
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1632487 Sample: VirtManage.exe Startdate: 08/03/2025 Architecture: WINDOWS Score: 42 89 ec2-52-14-160-176.us-east-2.compute.amazonaws.com 2->89 91 cdn-app-web2.lenete5970.workers.dev 2->91 99 Antivirus detection for dropped file 2->99 101 Multi AV Scanner detection for dropped file 2->101 103 .NET source code contains a domain name check 2->103 105 Sigma detected: Dot net compiler compiles file from suspicious location 2->105 10 VirtManage.exe 2 36 2->10         started        13 oleview.exe 2->13         started        16 msiexec.exe 2->16         started        18 svchost.exe 2->18         started        signatures3 process4 dnsIp5 81 C:\Users\user\AppData\Local\...\nsis7z.dll, PE32 10->81 dropped 83 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 10->83 dropped 85 C:\ProgramData\Microsoft\...\zlib1.dll, PE32 10->85 dropped 87 9 other malicious files 10->87 dropped 21 oleview.exe 10->21         started        24 7za.exe 6 10->24         started        27 msiexec.exe 11 10->27         started        33 9 other processes 10->33 119 Suspicious powershell command line found 13->119 121 Obfuscated command line found 13->121 29 powershell.exe 13->29         started        31 msiexec.exe 1 1 16->31         started        93 127.0.0.1 unknown unknown 18->93 file6 signatures7 process8 file9 107 Suspicious powershell command line found 21->107 109 Obfuscated command line found 21->109 111 Encrypted powershell cmdline option found 21->111 35 powershell.exe 21->35         started        67 C:\ProgramData\Microsoft\...\oleview.exe, PE32+ 24->67 dropped 69 C:\ProgramData\Microsoft\...\aclui.dll, PE32+ 24->69 dropped 71 C:\ProgramData\Microsoft\...\aclui-2.dll, PE32+ 24->71 dropped 40 conhost.exe 24->40         started        73 C:\Users\user\AppData\Local\...\MSI3323.tmp, PE32 27->73 dropped 75 C:\Users\user\AppData\Local\...\MSI32C4.tmp, PE32 27->75 dropped 113 Loading BitLocker PowerShell Module 29->113 42 conhost.exe 29->42         started        44 WmiPrvSE.exe 31->44         started        77 C:\ProgramData\Microsoft\...\7za.exe, PE32+ 33->77 dropped 79 C:\ProgramData\Microsoft\...\7za.dll, PE32+ 33->79 dropped 46 w32tm.exe 1 33->46         started        48 conhost.exe 33->48         started        50 conhost.exe 33->50         started        52 7 other processes 33->52 signatures10 process11 dnsIp12 95 cdn-app-web2.lenete5970.workers.dev 104.21.62.135, 443, 49694, 49695 CLOUDFLARENETUS United States 35->95 63 C:\Users\user\AppData\...\b0okydtw.cmdline, Unicode 35->63 dropped 115 Uses whoami command line tool to query computer and username 35->115 117 Loading BitLocker PowerShell Module 35->117 54 csc.exe 35->54         started        57 conhost.exe 35->57         started        59 whoami.exe 35->59         started        97 ec2-52-14-160-176.us-east-2.compute.amazonaws.com 52.14.160.176, 123 AMAZON-02US United States 46->97 file13 signatures14 process15 file16 65 C:\Users\user\AppData\Local\...\b0okydtw.dll, PE32 54->65 dropped 61 cvtres.exe 54->61         started        process17
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery execution persistence
Behaviour
Checks SCSI registry key(s)
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Adds Run key to start application
Blocklisted process makes network request
Enumerates connected drives
Executes dropped EXE
Loads dropped DLL
Command and Scripting Interpreter: PowerShell
Unpacked files
SH256 hash:
c600dd34854aa5c6c97ed8c1c92d28034d661652b4d892d223b6805a4e864622
MD5 hash:
b587a6af7fd86eeb42425913b8d73d47
SHA1 hash:
ad388fa1cc0bec1fc45b30a460c53c56789bb11d
SH256 hash:
993dff08f417b232b65317382ae07faf4414e6b2bfb63b6001688995856c8c15
MD5 hash:
66f51bda6a404fbc54c90098a9e9c854
SHA1 hash:
d84529c2126e7c878f6ac52f7c3c2636c3995dda
SH256 hash:
b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
MD5 hash:
80e44ce4895304c6a3a831310fbf8cd0
SHA1 hash:
36bd49ae21c460be5753a904b4501f1abca53508
SH256 hash:
2cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77
MD5 hash:
11092c1d3fbb449a60695c44f9f3d183
SHA1 hash:
b89d614755f2e943df4d510d87a7fc1a3bcf5a33
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_TRUST_INFORequires Elevated Execution (level:requireAdministrator)high
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AdjustTokenPrivileges
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteExW
SHELL32.dll::SHFileOperationW
SHELL32.dll::SHGetFileInfoW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
ADVAPI32.dll::OpenProcessToken
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetDiskFreeSpaceW
KERNEL32.dll::GetCommandLineW
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::MoveFileExW
WIN_BASE_USER_APIRetrieves Account InformationADVAPI32.dll::LookupPrivilegeValueW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::AppendMenuW
USER32.dll::EmptyClipboard
USER32.dll::FindWindowExW
USER32.dll::OpenClipboard
USER32.dll::PeekMessageW
USER32.dll::CreateWindowExW

Comments