General
-
Target
bDiL.exe
-
Size
138KB
-
Sample
230305-3kzxxahh53
-
MD5
fcc0c059b3a4b6f9f865fcde362b9acb
-
SHA1
23edfe65a519d095ca11f3987bfe6de661953f49
-
SHA256
17a76858f5bba3812b8f429e261ba0e84baf8197fe1f4478aa6c7adc5d8dd6ff
-
SHA512
0ebd9972df18c0de58077dceaf0e9618e4e6c004d53775272c8db9613a8db90834e10a255213f55ff492ae489498cc9bdbecf386986cdb1d5a0d2cfe45785b43
-
SSDEEP
3072:2bvt5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/YO:2bv7S7BqjjYHdrqkL/
Behavioral task
behavioral1
Sample
bDiL.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bDiL.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
arrowrat
IL61HB
windowsii.duckdns.org:1338
3W69EU
Targets
-
-
Target
bDiL.exe
-
Size
138KB
-
MD5
fcc0c059b3a4b6f9f865fcde362b9acb
-
SHA1
23edfe65a519d095ca11f3987bfe6de661953f49
-
SHA256
17a76858f5bba3812b8f429e261ba0e84baf8197fe1f4478aa6c7adc5d8dd6ff
-
SHA512
0ebd9972df18c0de58077dceaf0e9618e4e6c004d53775272c8db9613a8db90834e10a255213f55ff492ae489498cc9bdbecf386986cdb1d5a0d2cfe45785b43
-
SSDEEP
3072:2bvt5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/YO:2bv7S7BqjjYHdrqkL/
Score10/10-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-