General
-
Target
Client.exe
-
Size
157KB
-
Sample
230228-b3fs7sgg41
-
MD5
c4d6588bee90ee0c7dd9b674199b0302
-
SHA1
a3b5f94a66b3198046fec3dd72c0399b6767e5d3
-
SHA256
f902c427484c65c3bcd1543072e4c53da376a7ba6151fb6d1ccd990bb7a94be2
-
SHA512
24b7ccf87ec5cc5e3af783a6500b1de4f8a381f31e0baf96f7755cca2a92afee310bcfb3c3bf8b7c033f4161f9b53bbcbd605ee281861e3cd59727870e795a8f
-
SSDEEP
3072:+bR3+0O5VbFHexuiCrK0ovzNC0Fie+5cVjvn+sZCh8/QbHb68Y:+bRu0OLoxuiCNovpke+cvnOaQ68
Behavioral task
behavioral1
Sample
Client.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
arrowrat
Client
194.ip.ply.gg:54552
oWzurbWMF
Targets
-
-
Target
Client.exe
-
Size
157KB
-
MD5
c4d6588bee90ee0c7dd9b674199b0302
-
SHA1
a3b5f94a66b3198046fec3dd72c0399b6767e5d3
-
SHA256
f902c427484c65c3bcd1543072e4c53da376a7ba6151fb6d1ccd990bb7a94be2
-
SHA512
24b7ccf87ec5cc5e3af783a6500b1de4f8a381f31e0baf96f7755cca2a92afee310bcfb3c3bf8b7c033f4161f9b53bbcbd605ee281861e3cd59727870e795a8f
-
SSDEEP
3072:+bR3+0O5VbFHexuiCrK0ovzNC0Fie+5cVjvn+sZCh8/QbHb68Y:+bRu0OLoxuiCNovpke+cvnOaQ68
Score10/10-
Modifies WinLogon for persistence
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-