General

  • Target

    4952a2b2bd5b557db6798946e03b8264.exe

  • Size

    158KB

  • Sample

    220809-ve4pxadcdr

  • MD5

    4952a2b2bd5b557db6798946e03b8264

  • SHA1

    80689d4742b237456dbaf2f5129a9452d18a02b4

  • SHA256

    b20df532e15674feb9da8728664caa14c6447f4473f2d64f6052de6af0737b3f

  • SHA512

    363178c39a43c7048a264a9d6aa0f64bc25a3b4ab752dd411dac40eef4acdec309d11ade25c6ae3e3ef50398d35ac36cecc302582ace0fd2b34b471e1f0b0bcd

  • SSDEEP

    3072:VbRJ+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPl8a8Y:VbR80ODhTEPgnjuIJzo+PPcfPt8

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

213.59.119.25:1337

Mutex

SBAyMWVxF

Targets

    • Target

      4952a2b2bd5b557db6798946e03b8264.exe

    • Size

      158KB

    • MD5

      4952a2b2bd5b557db6798946e03b8264

    • SHA1

      80689d4742b237456dbaf2f5129a9452d18a02b4

    • SHA256

      b20df532e15674feb9da8728664caa14c6447f4473f2d64f6052de6af0737b3f

    • SHA512

      363178c39a43c7048a264a9d6aa0f64bc25a3b4ab752dd411dac40eef4acdec309d11ade25c6ae3e3ef50398d35ac36cecc302582ace0fd2b34b471e1f0b0bcd

    • SSDEEP

      3072:VbRJ+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPl8a8Y:VbR80ODhTEPgnjuIJzo+PPcfPt8

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Tasks