Resubmissions

11-11-2022 23:03

221111-216jyscc66 10

11-11-2022 22:52

221111-2ttltacc22 10

General

  • Target

    MRH.exe

  • Size

    1.9MB

  • Sample

    221111-216jyscc66

  • MD5

    18585735c8866b21e2723a6f020bafd0

  • SHA1

    afb5b2c9d5ca57501835b0c56fd97b0641f01d88

  • SHA256

    e9c817d02acaf2fbb59a0a44be05dbb284ee622f50b2e2a598daac8bfb564672

  • SHA512

    88516af4bbbd9562a9ae9840124c6f9f1402f9a15a0ace5e2413023bbd80c37aa441cc39b8b48f8ca58f4192273e16cd590cd2e9e9a4298f6ed5b0497d54e6b8

  • SSDEEP

    49152:t82Cp8xP5AE/L4C0m9eKQr10XxpQQTf+4G7zsdtW:9E7eQqpIsG

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

213.239.219.58:1337

Mutex

nPxRArUjc

Targets

    • Target

      MRH.exe

    • Size

      1.9MB

    • MD5

      18585735c8866b21e2723a6f020bafd0

    • SHA1

      afb5b2c9d5ca57501835b0c56fd97b0641f01d88

    • SHA256

      e9c817d02acaf2fbb59a0a44be05dbb284ee622f50b2e2a598daac8bfb564672

    • SHA512

      88516af4bbbd9562a9ae9840124c6f9f1402f9a15a0ace5e2413023bbd80c37aa441cc39b8b48f8ca58f4192273e16cd590cd2e9e9a4298f6ed5b0497d54e6b8

    • SSDEEP

      49152:t82Cp8xP5AE/L4C0m9eKQr10XxpQQTf+4G7zsdtW:9E7eQqpIsG

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks