General
-
Target
sqjxHtZQi8.ps1
-
Size
1.2MB
-
Sample
240718-tckzcayfjg
-
MD5
ca1aa65d11c546f737d20939aac7577f
-
SHA1
ba6ac400f4729fc1d25bdbe7b46e18fc203c8d8b
-
SHA256
0e128c8329b4ac17b548b4e78ee4ac813a938d1b6bcf1dceff816ba97202a1e4
-
SHA512
b3e43ca2617fed5862d7e25e1ab02dadbdb666a7e75eb07d65ee9065c0b1ce741a3213f744972d18574b05fe7b283bf3dc69ab05abf20f051c02b86792b53242
-
SSDEEP
12288:iZmTk3LmZmTk3Lv2RDsUU1VG2RDsUU1VP2RDsUU1V/:iZmTAKZmTAr25gG25gP25g/
Behavioral task
behavioral1
Sample
sqjxHtZQi8.ps1
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
sqjxHtZQi8.ps1
Resource
win10v2004-20240709-en
Malware Config
Extracted
arrowrat
r00t
necessary-sick.gl.at.ply.gg:32835
DsCbljCVL
Targets
-
-
Target
sqjxHtZQi8.ps1
-
Size
1.2MB
-
MD5
ca1aa65d11c546f737d20939aac7577f
-
SHA1
ba6ac400f4729fc1d25bdbe7b46e18fc203c8d8b
-
SHA256
0e128c8329b4ac17b548b4e78ee4ac813a938d1b6bcf1dceff816ba97202a1e4
-
SHA512
b3e43ca2617fed5862d7e25e1ab02dadbdb666a7e75eb07d65ee9065c0b1ce741a3213f744972d18574b05fe7b283bf3dc69ab05abf20f051c02b86792b53242
-
SSDEEP
12288:iZmTk3LmZmTk3Lv2RDsUU1VG2RDsUU1VP2RDsUU1V/:iZmTAKZmTAr25gG25gP25g/
Score10/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-