General
-
Target
client.bin.exe
-
Size
144KB
-
Sample
221021-halx3sfffl
-
MD5
f4fdcb900e7af47100ac9e46945fbd55
-
SHA1
c1d235a9a2cae8d5a8d4f6ceb4eab9417e1b1fb2
-
SHA256
9160b90fa4a6a9cf22f943dba92cec64e2dc03c2317b5d9ab50a753fc410ce43
-
SHA512
236eef98d4695a5e1224a87a1dc598639e5c49f6dd192a96cc1b9f8305faa57078deb62d73906a33ba1c1fac4fa5ccc5f344a0f196dbba718b76a36667984ac2
-
SSDEEP
3072:Bsp9iv+DYM5ob0HGNSKsstcnZTJQDgWPaySsdH5boWz:Op9iTMSb0mgKFcQjhdH
Behavioral task
behavioral1
Sample
client.bin.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
client.bin.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
arrowrat
%Group%
%Hosts%:%Ports%
%MTX%
Targets
-
-
Target
client.bin.exe
-
Size
144KB
-
MD5
f4fdcb900e7af47100ac9e46945fbd55
-
SHA1
c1d235a9a2cae8d5a8d4f6ceb4eab9417e1b1fb2
-
SHA256
9160b90fa4a6a9cf22f943dba92cec64e2dc03c2317b5d9ab50a753fc410ce43
-
SHA512
236eef98d4695a5e1224a87a1dc598639e5c49f6dd192a96cc1b9f8305faa57078deb62d73906a33ba1c1fac4fa5ccc5f344a0f196dbba718b76a36667984ac2
-
SSDEEP
3072:Bsp9iv+DYM5ob0HGNSKsstcnZTJQDgWPaySsdH5boWz:Op9iTMSb0mgKFcQjhdH
Score10/10-
Async RAT payload
-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-