Trojan.Generic.Variant.Kryptik - Certificate “issued” by Comodo
Some suspicious/malicious Indicators : File code is packed and obfuscated ( Matched Compiler/Packer signature ( Armadillo v4.x ) , File calls a TLS callback at [.text:0x304160] , File code is self modifying , Tries to detects VM ( Queries physical drive ) , Reads the active computer name , Reads the cryptographic machine GUID , Interacts with the primary disk partition , Queries kernel debugger information , Opens the Kernel Security Device Driver , Input sample dropped files , Accesses potentially sensitive information from local browsers , Modifies proxy settings , Queries sensitive IE security settings , Installs hooks/patches the running process ( Input Sample wrote bytes to “WSHIP6.DLL” to “NSI.DLL” to “WSHTCPIP.DLL” ) , Get´s files from a webserver ( GET /download/e0aeac89ac7e98eeb766883ba0d89ad5/file965357.rar HTTP/1.1 , User-Agent: Christmas Mystery 5.5.4 , from semitico.ru ) , Runs shell commands ( /C timeout 3 > Nul & Del "C:\7e11bb217cc7940f9b7581fdca0c6536ebcc3908fd9faa0371604da8f45463d7.exe ) , Contacts 2 domains and 2 hosts , http request contains Base64 encoded artifacts , Found malicious artifacts related to “34.225.189.247”
Certificate Details :
Algorithm: rsaEncryption
Version: 3
Issuer: /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Code Signing CA
Serial: 300380148691980572746818459525692001930
Serial (Hex): e1fb1cc01f0a065d957e2554eed00e8a
Valid from: Jun 14 00:00:00 2017 GMT
Valid until: Jun 14 23:59:59 2018 GMT
C (countryName): RU [5255]
CN (commonName): VIPAL [564950414C]
L (localityName): Krasnogorsk [4B7261736E6F676F72736B]
O (organizationName): VIPAL [564950414C]
ST (stateOrProvinceName): RU [5255]
postalCode (postalCode): 143402 [313433343032]
street (streetAddress): Shkolnaya 2 [53686B6F6C6E617961202032]