General

  • Target

    Client.exe

  • Size

    157KB

  • Sample

    230226-nezmmagg27

  • MD5

    881c51282ebd1bcef1362dd4cd00aec3

  • SHA1

    6f701e0d16191e2a120bf24f873f74a167be5748

  • SHA256

    220f466224194d58d64f18ef376a0c4a7de07c93527070d7b357a708fb4293bf

  • SHA512

    57ff91504021d42079f4ffe0dbd6e185105e5c8a6bba11e20b864720f04243604d48b383ef5d93978ad7fe48e24e876305a374a994c7c5c6ab3303e4c0d97a7e

  • SSDEEP

    3072:+bR3+0O5VbFHexuiCrK0ovzNC0Fie+5cVjvn+sZCh8/QbNb68Y:+bRu0OLoxuiCNovpke+cvnOaQI8

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

194.ip.ply.gg:54552

Mutex

AbZfjNVtY

Targets

    • Target

      Client.exe

    • Size

      157KB

    • MD5

      881c51282ebd1bcef1362dd4cd00aec3

    • SHA1

      6f701e0d16191e2a120bf24f873f74a167be5748

    • SHA256

      220f466224194d58d64f18ef376a0c4a7de07c93527070d7b357a708fb4293bf

    • SHA512

      57ff91504021d42079f4ffe0dbd6e185105e5c8a6bba11e20b864720f04243604d48b383ef5d93978ad7fe48e24e876305a374a994c7c5c6ab3303e4c0d97a7e

    • SSDEEP

      3072:+bR3+0O5VbFHexuiCrK0ovzNC0Fie+5cVjvn+sZCh8/QbNb68Y:+bRu0OLoxuiCNovpke+cvnOaQI8

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies WinLogon for persistence

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks