General

  • Target

    xueSatPQMUFH.exe

  • Size

    138KB

  • Sample

    230305-3gjfrahc7y

  • MD5

    a771f2894d94322a49b0ce2e14493a3e

  • SHA1

    63cd63601410fe6be499a9102cbbd6c675e72f56

  • SHA256

    150c06bc4cba9064302fb96f2b3565f433b43847b6d59448ce15b9024e6c9b0a

  • SHA512

    ab75a88fbc2a8fd5320fdddb525af9a70c3553fa33b967545d4491a0ecd2e24869caeea49fdd7324d4ed666c42b8f5444c474056dddda0746af135bb97478765

  • SSDEEP

    3072:6bvA5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Yd:6bv4S7BqjjYHdrqkL/

Malware Config

Extracted

Family

arrowrat

Botnet

AG35PW

C2

androidmedallo.duckdns.org:1338

Mutex

ZD2651

Targets

    • Target

      xueSatPQMUFH.exe

    • Size

      138KB

    • MD5

      a771f2894d94322a49b0ce2e14493a3e

    • SHA1

      63cd63601410fe6be499a9102cbbd6c675e72f56

    • SHA256

      150c06bc4cba9064302fb96f2b3565f433b43847b6d59448ce15b9024e6c9b0a

    • SHA512

      ab75a88fbc2a8fd5320fdddb525af9a70c3553fa33b967545d4491a0ecd2e24869caeea49fdd7324d4ed666c42b8f5444c474056dddda0746af135bb97478765

    • SSDEEP

      3072:6bvA5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Yd:6bv4S7BqjjYHdrqkL/

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies WinLogon for persistence

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks