General
-
Target
bEle.exe
-
Size
138KB
-
Sample
230305-3kelzahh47
-
MD5
11b99c53b1e6030355af231a3a7fa65b
-
SHA1
50b4a627dd808c1e332c2803286234f37e46bc2d
-
SHA256
65403a8b9ecca912ea5cfa91aecdbe77c23e652e4c7465efded126c74711f65e
-
SHA512
33a134c15708651e725daf0c834a01d970718f90109db275c38dbfd0501486c126d0566ab61cc55f4f47c3e7988483b7b445101b11388cff6399f4815ec63764
-
SSDEEP
3072:KbvC5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/YP:KbvuS7BqjjYHdrqkL/
Behavioral task
behavioral1
Sample
bEle.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bEle.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
arrowrat
41IUHU
6.tcp.eu.ngrok.io:15821
S2TDUW
Targets
-
-
Target
bEle.exe
-
Size
138KB
-
MD5
11b99c53b1e6030355af231a3a7fa65b
-
SHA1
50b4a627dd808c1e332c2803286234f37e46bc2d
-
SHA256
65403a8b9ecca912ea5cfa91aecdbe77c23e652e4c7465efded126c74711f65e
-
SHA512
33a134c15708651e725daf0c834a01d970718f90109db275c38dbfd0501486c126d0566ab61cc55f4f47c3e7988483b7b445101b11388cff6399f4815ec63764
-
SSDEEP
3072:KbvC5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/YP:KbvuS7BqjjYHdrqkL/
Score10/10-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-