General
-
Target
7b2ec8aedfd42a95a5994dff19115471
-
Size
138KB
-
Sample
220803-qhsdtsbdg2
-
MD5
7b2ec8aedfd42a95a5994dff19115471
-
SHA1
f51aa65fc904272a1e344a57c436ba8632065b6c
-
SHA256
5d573461fbe87a4441a12b5b61a3b74019aa21a784f9cf4410e1da100a55c792
-
SHA512
1f5a313bf59129967db3e6f515edb364bde5c3d66c8cd67f27f79ff65cfdd8f982a68c3934e7574709ab71608c5d877d30f8ac8dc3986dd03523d8f6ad2caada
-
SSDEEP
3072:2bvik5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Y+:2bv5S7BqjjYHdrqkL/
Static task
static1
Behavioral task
behavioral1
Sample
7b2ec8aedfd42a95a5994dff19115471.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
7b2ec8aedfd42a95a5994dff19115471.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
arrowrat
WQ0CSG
Pandorace.ddnsgeek.com:1338
XPL7P6
Targets
-
-
Target
7b2ec8aedfd42a95a5994dff19115471
-
Size
138KB
-
MD5
7b2ec8aedfd42a95a5994dff19115471
-
SHA1
f51aa65fc904272a1e344a57c436ba8632065b6c
-
SHA256
5d573461fbe87a4441a12b5b61a3b74019aa21a784f9cf4410e1da100a55c792
-
SHA512
1f5a313bf59129967db3e6f515edb364bde5c3d66c8cd67f27f79ff65cfdd8f982a68c3934e7574709ab71608c5d877d30f8ac8dc3986dd03523d8f6ad2caada
-
SSDEEP
3072:2bvik5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Y+:2bv5S7BqjjYHdrqkL/
Score10/10-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-