General
-
Target
ClientH.exe
-
Size
90KB
-
Sample
230806-gssb5sgb66
-
MD5
5558467d200c00a5acab51d4a9ca98dd
-
SHA1
f9d50c3556451b056deb0950b6bdd4c3ecbb570f
-
SHA256
213452a323be1617cfa62abeae43d873bec1e5c740aa2177e157a9772a92f231
-
SHA512
80167cbf7301726ef6a1fd8f2c91db4076f5f5c869338953b1dacc88bf7f82e7caadabbbf32ecda3327c1be4c9da2477a198123a9ac1acf114f03c64bada3921
-
SSDEEP
1536:ebRiQMhQ57SK3bUzZdQ1iIMvnZlbLxjV3AGq5gWlocT1wzySsd9NJ33p:ebRF57SKsstcnZTJQDgWPaySsdH5Z
Behavioral task
behavioral1
Sample
ClientH.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ClientH.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
arrowrat
VenomHVNC
185.183.35.122:4448
GHAEYKXuf.exe
Targets
-
-
Target
ClientH.exe
-
Size
90KB
-
MD5
5558467d200c00a5acab51d4a9ca98dd
-
SHA1
f9d50c3556451b056deb0950b6bdd4c3ecbb570f
-
SHA256
213452a323be1617cfa62abeae43d873bec1e5c740aa2177e157a9772a92f231
-
SHA512
80167cbf7301726ef6a1fd8f2c91db4076f5f5c869338953b1dacc88bf7f82e7caadabbbf32ecda3327c1be4c9da2477a198123a9ac1acf114f03c64bada3921
-
SSDEEP
1536:ebRiQMhQ57SK3bUzZdQ1iIMvnZlbLxjV3AGq5gWlocT1wzySsd9NJ33p:ebRF57SKsstcnZTJQDgWPaySsdH5Z
Score10/10-
Modifies WinLogon for persistence
-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1