General
-
Target
bDCK.exe
-
Size
138KB
-
Sample
230305-3lj8vahh57
-
MD5
e22c97f1931fdec29962ae778c5b44c3
-
SHA1
7b0587f698a12619a735ce2536ec6a298ac92874
-
SHA256
2380ff875da958af3a345764860a8d70761bdc4f9feb20c1b183a83b9cae1b0c
-
SHA512
6f65b90401c650f66e22fb65c176edf73c09ef0bc0a34f7ee761fb984032e975cc3835dcdb22bc3d62c99678ad7a03b0fcbeb8dd679728ce49d035763c49c309
-
SSDEEP
3072:2bvt5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Y0:2bv7S7BqjjYHdrqkL/
Behavioral task
behavioral1
Sample
bDCK.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bDCK.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
arrowrat
Y905DC
windowsii.duckdns.org:1338
QTZ3XG
Targets
-
-
Target
bDCK.exe
-
Size
138KB
-
MD5
e22c97f1931fdec29962ae778c5b44c3
-
SHA1
7b0587f698a12619a735ce2536ec6a298ac92874
-
SHA256
2380ff875da958af3a345764860a8d70761bdc4f9feb20c1b183a83b9cae1b0c
-
SHA512
6f65b90401c650f66e22fb65c176edf73c09ef0bc0a34f7ee761fb984032e975cc3835dcdb22bc3d62c99678ad7a03b0fcbeb8dd679728ce49d035763c49c309
-
SSDEEP
3072:2bvt5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Y0:2bv7S7BqjjYHdrqkL/
Score10/10-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-