General
-
Target
MRH.exe
-
Size
1.9MB
-
Sample
221111-216jyscc66
-
MD5
18585735c8866b21e2723a6f020bafd0
-
SHA1
afb5b2c9d5ca57501835b0c56fd97b0641f01d88
-
SHA256
e9c817d02acaf2fbb59a0a44be05dbb284ee622f50b2e2a598daac8bfb564672
-
SHA512
88516af4bbbd9562a9ae9840124c6f9f1402f9a15a0ace5e2413023bbd80c37aa441cc39b8b48f8ca58f4192273e16cd590cd2e9e9a4298f6ed5b0497d54e6b8
-
SSDEEP
49152:t82Cp8xP5AE/L4C0m9eKQr10XxpQQTf+4G7zsdtW:9E7eQqpIsG
Static task
static1
Behavioral task
behavioral1
Sample
MRH.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
MRH.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
arrowrat
Client
213.239.219.58:1337
nPxRArUjc
Targets
-
-
Target
MRH.exe
-
Size
1.9MB
-
MD5
18585735c8866b21e2723a6f020bafd0
-
SHA1
afb5b2c9d5ca57501835b0c56fd97b0641f01d88
-
SHA256
e9c817d02acaf2fbb59a0a44be05dbb284ee622f50b2e2a598daac8bfb564672
-
SHA512
88516af4bbbd9562a9ae9840124c6f9f1402f9a15a0ace5e2413023bbd80c37aa441cc39b8b48f8ca58f4192273e16cd590cd2e9e9a4298f6ed5b0497d54e6b8
-
SSDEEP
49152:t82Cp8xP5AE/L4C0m9eKQr10XxpQQTf+4G7zsdtW:9E7eQqpIsG
Score10/10-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-