General
-
Target
Client.exe
-
Size
157KB
-
Sample
230226-nezmmagg27
-
MD5
881c51282ebd1bcef1362dd4cd00aec3
-
SHA1
6f701e0d16191e2a120bf24f873f74a167be5748
-
SHA256
220f466224194d58d64f18ef376a0c4a7de07c93527070d7b357a708fb4293bf
-
SHA512
57ff91504021d42079f4ffe0dbd6e185105e5c8a6bba11e20b864720f04243604d48b383ef5d93978ad7fe48e24e876305a374a994c7c5c6ab3303e4c0d97a7e
-
SSDEEP
3072:+bR3+0O5VbFHexuiCrK0ovzNC0Fie+5cVjvn+sZCh8/QbNb68Y:+bRu0OLoxuiCNovpke+cvnOaQI8
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Client.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
arrowrat
Client
194.ip.ply.gg:54552
AbZfjNVtY
Targets
-
-
Target
Client.exe
-
Size
157KB
-
MD5
881c51282ebd1bcef1362dd4cd00aec3
-
SHA1
6f701e0d16191e2a120bf24f873f74a167be5748
-
SHA256
220f466224194d58d64f18ef376a0c4a7de07c93527070d7b357a708fb4293bf
-
SHA512
57ff91504021d42079f4ffe0dbd6e185105e5c8a6bba11e20b864720f04243604d48b383ef5d93978ad7fe48e24e876305a374a994c7c5c6ab3303e4c0d97a7e
-
SSDEEP
3072:+bR3+0O5VbFHexuiCrK0ovzNC0Fie+5cVjvn+sZCh8/QbNb68Y:+bRu0OLoxuiCNovpke+cvnOaQI8
Score10/10-
Modifies WinLogon for persistence
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-