General

  • Target

    blaL-main.zip

  • Size

    1.2MB

  • Sample

    221207-hd31rsfg9y

  • MD5

    ac65aaa5f52d70d095d24c55a7aaceac

  • SHA1

    c5b0ebefcbaca1b5ee6e04e54eb2b55d3c3015fe

  • SHA256

    bd1920a812ea60374eadd1aa605890cde648b7e678d3792bb4b958056a72a1e7

  • SHA512

    eb490ae70189e25050b2d37e0a1888eb98d8e502c289149d3d3437da423d66058f74002efceff20e37206c465ee03abcea4aa5feed8c05385e2593ee30556bfc

  • SSDEEP

    24576:hneo8lj/+E27XBa6cLoSoz8uh245tw9xuRJJ94g2hO26VDH2l:JC2P7XB1z/sIQ+vstwa

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

185.246.221.202:17168

Mutex

WcOErhAdu

Targets

    • Target

      wininfo64/lib32.exe

    • Size

      2.2MB

    • MD5

      286de0123129cb1bdb0533301f435746

    • SHA1

      28887e5a7c28661db7b3d4da3612bafd05604813

    • SHA256

      a1923ce6f95ba7e57b9d8ea27c1867283cacbc992a0f9e16ec9dd864930d9d71

    • SHA512

      07da8387eeffada23d39eed1390972e37031ea72a2f8a046027ac160f8ecef81ba3011698dac5fafc5114fe688796b1bc7c4df8a283dc1e23f76f0a2faf0b0bc

    • SSDEEP

      49152:IhgaZCojYG3CmQYbfHxDJ6aiyc7jntoe:IhggwdY7d0tV

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks