General
-
Target
ClientH.exe
-
Size
90KB
-
Sample
230718-mylz7sad7v
-
MD5
5ac5cf4a09a5c6dfd82669a0e24f675d
-
SHA1
4f0993bfd2245da594000bb7c2d2bd7d02b60d53
-
SHA256
6136b0b9b28b52962f090cdf34ac650c4b184f3a65e863e2051cdc1219aff051
-
SHA512
e0317cf9a5a495f5e90a88f4a96517626a30c016b7374db41bc79a8bcb0920fcf7691ca3cf48c712b8bc2db075d734ca7cacc771e8f604297600187afe314d3f
-
SSDEEP
1536:dbRiQMB57SK3bUzZdQ1iIMvnZlbLxjV3AGq5gWlocT1wzySsd9NJ33a:dbRO57SKsstcnZTJQDgWPaySsdH5K
Behavioral task
behavioral1
Sample
ClientH.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ClientH.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
arrowrat
VenomHVNC
wasted9sss1-57562.portmap.host:57562
uSzDNutNI.exe
Targets
-
-
Target
ClientH.exe
-
Size
90KB
-
MD5
5ac5cf4a09a5c6dfd82669a0e24f675d
-
SHA1
4f0993bfd2245da594000bb7c2d2bd7d02b60d53
-
SHA256
6136b0b9b28b52962f090cdf34ac650c4b184f3a65e863e2051cdc1219aff051
-
SHA512
e0317cf9a5a495f5e90a88f4a96517626a30c016b7374db41bc79a8bcb0920fcf7691ca3cf48c712b8bc2db075d734ca7cacc771e8f604297600187afe314d3f
-
SSDEEP
1536:dbRiQMB57SK3bUzZdQ1iIMvnZlbLxjV3AGq5gWlocT1wzySsd9NJ33a:dbRO57SKsstcnZTJQDgWPaySsdH5K
Score10/10-
Modifies WinLogon for persistence
-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-