Behavioral task
behavioral1
Sample
bJyy.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bJyy.exe
Resource
win10v2004-20230220-en
General
-
Target
bJyy.exe
-
Size
138KB
-
MD5
bdc72c4851b8543f9f57215f1a3fc336
-
SHA1
b04f8b232040200d68a75400c5e160d0f61387f7
-
SHA256
59a734c5ae920f5791ace8728981fffe7c9f9270fe26c27c9482dde038dd398c
-
SHA512
884be565c02616d79feea31aaa2d13926e9fe530ed656a31595d2f295c346867cf4f4c313350b695d3f8b30e56c625995e360e50820bccc605e915ab3cd68599
-
SSDEEP
3072:6bvu5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Y/:6bvqS7BqjjYHdrqkL/
Malware Config
Extracted
arrowrat
0XU9G7
pandora2425.duckdns.org:2425
JGLG6C
Signatures
-
Arrowrat family
Files
-
bJyy.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ