General
-
Target
xueSatPQMUFH.exe
-
Size
138KB
-
Sample
230305-3gjfrahc7y
-
MD5
a771f2894d94322a49b0ce2e14493a3e
-
SHA1
63cd63601410fe6be499a9102cbbd6c675e72f56
-
SHA256
150c06bc4cba9064302fb96f2b3565f433b43847b6d59448ce15b9024e6c9b0a
-
SHA512
ab75a88fbc2a8fd5320fdddb525af9a70c3553fa33b967545d4491a0ecd2e24869caeea49fdd7324d4ed666c42b8f5444c474056dddda0746af135bb97478765
-
SSDEEP
3072:6bvA5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Yd:6bv4S7BqjjYHdrqkL/
Behavioral task
behavioral1
Sample
xueSatPQMUFH.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
xueSatPQMUFH.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
arrowrat
AG35PW
androidmedallo.duckdns.org:1338
ZD2651
Targets
-
-
Target
xueSatPQMUFH.exe
-
Size
138KB
-
MD5
a771f2894d94322a49b0ce2e14493a3e
-
SHA1
63cd63601410fe6be499a9102cbbd6c675e72f56
-
SHA256
150c06bc4cba9064302fb96f2b3565f433b43847b6d59448ce15b9024e6c9b0a
-
SHA512
ab75a88fbc2a8fd5320fdddb525af9a70c3553fa33b967545d4491a0ecd2e24869caeea49fdd7324d4ed666c42b8f5444c474056dddda0746af135bb97478765
-
SSDEEP
3072:6bvA5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Yd:6bv4S7BqjjYHdrqkL/
Score10/10-
Modifies WinLogon for persistence
-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-