General

  • Target

    Client.exe

  • Size

    158KB

  • Sample

    221015-jqaenafdbq

  • MD5

    c45efc7859477f21053f9aceed75ee2e

  • SHA1

    f6131ecbb660b1dc6807f5136535f56ec624a894

  • SHA256

    612279d12e8d9d25ad3de6d0322cb0e03047fcbda29c7753f761ca1dea2ef36d

  • SHA512

    67947148c26ac305047d348dc2cfdb793c4ffd76e383044b6babd61f595a2662e916bee6ffa31529be1eb2b7278dc4aa76c39bd957257c1131551623548e601c

  • SSDEEP

    3072:dbR1+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPJ8a8Y:dbRY0ODhTEPgnjuIJzo+PPcfPJ8

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

95.180.79.109:6363

Mutex

YRTqtvXFg

Targets

    • Target

      Client.exe

    • Size

      158KB

    • MD5

      c45efc7859477f21053f9aceed75ee2e

    • SHA1

      f6131ecbb660b1dc6807f5136535f56ec624a894

    • SHA256

      612279d12e8d9d25ad3de6d0322cb0e03047fcbda29c7753f761ca1dea2ef36d

    • SHA512

      67947148c26ac305047d348dc2cfdb793c4ffd76e383044b6babd61f595a2662e916bee6ffa31529be1eb2b7278dc4aa76c39bd957257c1131551623548e601c

    • SSDEEP

      3072:dbR1+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPJ8a8Y:dbRY0ODhTEPgnjuIJzo+PPcfPJ8

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Async RAT payload

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks