General
-
Target
hvnc.exe
-
Size
138KB
-
Sample
220426-wdz6rshdem
-
MD5
bb434c347ca1709e54bee1a5d9a5757e
-
SHA1
844b1f01f53eb6e8f8934880fa7f8994c4245dd4
-
SHA256
0caa17db0c1d695ce4e5bc3f3fc7c9c2e7f96e489108e0303b81fa45efcf92bd
-
SHA512
46b87c83ce85d44b152a5921b76f65af19fc93896bc8557b979c72ffdbaef3b21245f1c8aea75a5bd2125bc8df7485f2bcaf98d8b7ee0785c8c1496d08a571be
-
SSDEEP
3072:PbvG5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Yt:PbviS7BqjjYHdrqkL/
Static task
static1
Behavioral task
behavioral1
Sample
hvnc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
hvnc.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
arrowrat
KRCK1R
185.183.35.38:1338
4IA671
Targets
-
-
Target
hvnc.exe
-
Size
138KB
-
MD5
bb434c347ca1709e54bee1a5d9a5757e
-
SHA1
844b1f01f53eb6e8f8934880fa7f8994c4245dd4
-
SHA256
0caa17db0c1d695ce4e5bc3f3fc7c9c2e7f96e489108e0303b81fa45efcf92bd
-
SHA512
46b87c83ce85d44b152a5921b76f65af19fc93896bc8557b979c72ffdbaef3b21245f1c8aea75a5bd2125bc8df7485f2bcaf98d8b7ee0785c8c1496d08a571be
-
SSDEEP
3072:PbvG5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Yt:PbviS7BqjjYHdrqkL/
Score10/10-
Modifies WinLogon for persistence
-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-