General
-
Target
bJyy.exe
-
Size
138KB
-
Sample
230305-3kzxxahh54
-
MD5
bdc72c4851b8543f9f57215f1a3fc336
-
SHA1
b04f8b232040200d68a75400c5e160d0f61387f7
-
SHA256
59a734c5ae920f5791ace8728981fffe7c9f9270fe26c27c9482dde038dd398c
-
SHA512
884be565c02616d79feea31aaa2d13926e9fe530ed656a31595d2f295c346867cf4f4c313350b695d3f8b30e56c625995e360e50820bccc605e915ab3cd68599
-
SSDEEP
3072:6bvu5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Y/:6bvqS7BqjjYHdrqkL/
Behavioral task
behavioral1
Sample
bJyy.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bJyy.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
arrowrat
0XU9G7
pandora2425.duckdns.org:2425
JGLG6C
Targets
-
-
Target
bJyy.exe
-
Size
138KB
-
MD5
bdc72c4851b8543f9f57215f1a3fc336
-
SHA1
b04f8b232040200d68a75400c5e160d0f61387f7
-
SHA256
59a734c5ae920f5791ace8728981fffe7c9f9270fe26c27c9482dde038dd398c
-
SHA512
884be565c02616d79feea31aaa2d13926e9fe530ed656a31595d2f295c346867cf4f4c313350b695d3f8b30e56c625995e360e50820bccc605e915ab3cd68599
-
SSDEEP
3072:6bvu5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Y/:6bvqS7BqjjYHdrqkL/
Score10/10-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-