General

  • Target

    arrow.zip

  • Size

    8.0MB

  • Sample

    230504-pqel9scc96

  • MD5

    84a44cc53094afe348b5615b6b3baa6a

  • SHA1

    666909e990272721081f86799fec6895b89bd4ac

  • SHA256

    8a572189d449be581188db033f77172d4f84649cdddaa81e8f00390e8e71a987

  • SHA512

    a0e9ddc119bffe1475e829148348a0a8c9dda7c006bee2b6f7257d5472e728c3999e74475ca8bcb02196ab48b42765ebd34aa1f72bfb22b7784773e501387ee8

  • SSDEEP

    196608:ewpWfbVuCQG7Ur6CFK9YuMIwxcq4vfhOG7Ur6d/Q9:RAoCQG86qqY1IwxcfAG86dW

Malware Config

Extracted

Family

arrowrat

Botnet

KRCK1R

C2

185.183.35.38:1338

Mutex

4IA671

Extracted

Family

arrowrat

Botnet

AG35PW

C2

androidmedallo.duckdns.org:1338

Mutex

ZD2651

Extracted

Family

arrowrat

Botnet

IL61HB

C2

windowsii.duckdns.org:1338

Mutex

3W69EU

Extracted

Family

arrowrat

Botnet

Y905DC

C2

windowsii.duckdns.org:1338

Mutex

QTZ3XG

Extracted

Family

arrowrat

Botnet

9G7DXW

C2

51.178.165.162:1338

Mutex

Q2909Q

Extracted

Family

asyncrat

Version

ArrowRAT 1.0.2.0

Botnet

ArrowRAT Clients

C2

arrw.duckdns.org:5557

Mutex

ArrowRAT_Mutex_ArrowRAT

Attributes
  • delay

    0

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

arrowrat

Botnet

0XU9G7

C2

pandora2425.duckdns.org:2425

Mutex

JGLG6C

Extracted

Family

arrowrat

Botnet

OJG36C

C2

mayo21.duckdns.org:2158

Mutex

NT7WTE

Extracted

Family

arrowrat

Botnet

WQ0CSG

C2

Pandorace.ddnsgeek.com:1338

Mutex

XPL7P6

Extracted

Family

arrowrat

Botnet

41IUHU

C2

6.tcp.eu.ngrok.io:15821

Mutex

S2TDUW

Extracted

Family

arrowrat

Botnet

21LTX5

C2

bigrussianfloppa.duckdns.org:1338

Mutex

M7SYHB

Extracted

Family

arrowrat

Botnet

Client

C2

213.59.119.25:1337

pdra.duckdns.org:5788

185.246.221.202:17168

Mutex

SBAyMWVxF

Extracted

Family

arrowrat

Botnet

P6YJEF

C2

34.91.75.162:1338

Mutex

UDD7NU

Extracted

Family

arrowrat

Botnet

ArrowRAT

C2

arhvn.duckdns.org:5555

Mutex

fKHUsQQAb.exe

Extracted

Family

arrowrat

Botnet

company

C2

103.178.236.127:1337

Mutex

pKfaPMMUE

Targets

    • Target

      arrow/0caa17db0c1d695ce4e5bc3f3fc7c9c2e7f96e489108e0303b81fa45efcf92bd.bin

    • Size

      138KB

    • MD5

      bb434c347ca1709e54bee1a5d9a5757e

    • SHA1

      844b1f01f53eb6e8f8934880fa7f8994c4245dd4

    • SHA256

      0caa17db0c1d695ce4e5bc3f3fc7c9c2e7f96e489108e0303b81fa45efcf92bd

    • SHA512

      46b87c83ce85d44b152a5921b76f65af19fc93896bc8557b979c72ffdbaef3b21245f1c8aea75a5bd2125bc8df7485f2bcaf98d8b7ee0785c8c1496d08a571be

    • SSDEEP

      3072:PbvG5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Yt:PbviS7BqjjYHdrqkL/

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies WinLogon for persistence

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

    • Target

      arrow/150c06bc4cba9064302fb96f2b3565f433b43847b6d59448ce15b9024e6c9b0a.bin

    • Size

      138KB

    • MD5

      a771f2894d94322a49b0ce2e14493a3e

    • SHA1

      63cd63601410fe6be499a9102cbbd6c675e72f56

    • SHA256

      150c06bc4cba9064302fb96f2b3565f433b43847b6d59448ce15b9024e6c9b0a

    • SHA512

      ab75a88fbc2a8fd5320fdddb525af9a70c3553fa33b967545d4491a0ecd2e24869caeea49fdd7324d4ed666c42b8f5444c474056dddda0746af135bb97478765

    • SSDEEP

      3072:6bvA5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Yd:6bv4S7BqjjYHdrqkL/

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies WinLogon for persistence

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

    • Target

      arrow/17a76858f5bba3812b8f429e261ba0e84baf8197fe1f4478aa6c7adc5d8dd6ff.bin

    • Size

      138KB

    • MD5

      fcc0c059b3a4b6f9f865fcde362b9acb

    • SHA1

      23edfe65a519d095ca11f3987bfe6de661953f49

    • SHA256

      17a76858f5bba3812b8f429e261ba0e84baf8197fe1f4478aa6c7adc5d8dd6ff

    • SHA512

      0ebd9972df18c0de58077dceaf0e9618e4e6c004d53775272c8db9613a8db90834e10a255213f55ff492ae489498cc9bdbecf386986cdb1d5a0d2cfe45785b43

    • SSDEEP

      3072:2bvt5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/YO:2bv7S7BqjjYHdrqkL/

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

    • Target

      arrow/2380ff875da958af3a345764860a8d70761bdc4f9feb20c1b183a83b9cae1b0c.bin

    • Size

      138KB

    • MD5

      e22c97f1931fdec29962ae778c5b44c3

    • SHA1

      7b0587f698a12619a735ce2536ec6a298ac92874

    • SHA256

      2380ff875da958af3a345764860a8d70761bdc4f9feb20c1b183a83b9cae1b0c

    • SHA512

      6f65b90401c650f66e22fb65c176edf73c09ef0bc0a34f7ee761fb984032e975cc3835dcdb22bc3d62c99678ad7a03b0fcbeb8dd679728ce49d035763c49c309

    • SSDEEP

      3072:2bvt5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Y0:2bv7S7BqjjYHdrqkL/

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

    • Target

      arrow/2fb8100d4fb1ee22837aec10889c4b0303434e50944b96a390164e449eb62dee.bin

    • Size

      28KB

    • MD5

      6082510f97c65c06f1d21809efa9d040

    • SHA1

      78e65ca4aef33eea338a2972f19679552cb7c701

    • SHA256

      2fb8100d4fb1ee22837aec10889c4b0303434e50944b96a390164e449eb62dee

    • SHA512

      fc56029acc10a16f98d0405d9dca6e33be996a8ae2bc7353c4cac9b5431566cdb675da975740f5cd428ef24f28c3542e2070dd6d29e9b519d55d92a0ea5fc649

    • SSDEEP

      768:heqX/79Z4TCXfVsNuRVbpLchtszwBRUgT6TtQ0nt:hBX/zlsNuRVbWawBKgT6TtQK

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Target

      arrow/3dbd1065734c9b3e603bc2a81dbadb77beeb54c6a918a6a4ae0687659ac3c0fb.bin

    • Size

      138KB

    • MD5

      7da02064216481c00e88ca35db73c247

    • SHA1

      99983e91bc7511fcb650c31c26a33b581e242913

    • SHA256

      3dbd1065734c9b3e603bc2a81dbadb77beeb54c6a918a6a4ae0687659ac3c0fb

    • SHA512

      df61e4e5226cf035592ec464b68452507df4178edac853329cda8e0fe06102f8eae65bd9d7a6b68d835e2d7ef4ed3748ccd8bc1ed918eb2a85fb9788e5aafae6

    • SSDEEP

      3072:LbvJ5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/YK:Lbv3S7BqjjYHdrqkL/

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies WinLogon for persistence

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

    • Target

      arrow/4a09a7db3729524b264f61bd57d422714e43167d391eae1df73cad90c2982d07.bin

    • Size

      65KB

    • MD5

      dece5aade19a0a646a41e40fe42deda3

    • SHA1

      1ef25d469b835fcb3f4e1a10d894e0779a297730

    • SHA256

      4a09a7db3729524b264f61bd57d422714e43167d391eae1df73cad90c2982d07

    • SHA512

      8a5bbffe0cad2c85df2b305dcde269ceee70804bde2c26bea0b55e09fd79ce47fffdcfff19e3f21baa1254cde4aa89c9597945b18d666a13f075c45d4a74b3e5

    • SSDEEP

      1536:mnhjtb22D0b82c1rVjB1bbsSxResZf+aswNpqKmY7:mnP22wbg1f1bbsSbxKwWz

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Target

      arrow/4c4d844ace41156600bf0c2ab9df287538002abf30d0ba3f50836b2e49f5e0a5.bin

    • Size

      17KB

    • MD5

      e41f3d5033575c4f4cf2acd0d1d0624d

    • SHA1

      18ff7a2ec479855e65ba2a83deeb917abed16ff9

    • SHA256

      4c4d844ace41156600bf0c2ab9df287538002abf30d0ba3f50836b2e49f5e0a5

    • SHA512

      d51e644c8f66735625556d15af240756b72f61f616133b9412b27cacc17fadf42a8ee2113eaa6f544c376bd66464cf177f8ca556d75d532d2d799f5327e2fd29

    • SSDEEP

      384:eBAiyJNFVJU14KU6nX2D+bFQkNubvg+4OXEW46njPHoWWDDDDDDDDDDN:iGFwWp6nnb+/XjDjYDDDDDDDDDDN

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Target

      arrow/54a0a1cf6b5fb30614ff4a2a7757cadf23fa539b4a352137dfc3292c6ceffa24.bin

    • Size

      361KB

    • MD5

      8fa43d91b2fbf126d65bdb8520b57f79

    • SHA1

      1de09d6a5f44169c6c0fe0290dbaca04d13789cc

    • SHA256

      54a0a1cf6b5fb30614ff4a2a7757cadf23fa539b4a352137dfc3292c6ceffa24

    • SHA512

      63086eb0f61cbc8f240d332ab09342bf0abc449a2a6d94ba13ce4cfff62832eee7193aa71c3eaa0ea5edb260169c8aba4deade1db5dab0aae0c5d6f3f9dd0bf5

    • SSDEEP

      6144:5bRq0OWdltyB7dWY0J6ddKwpgouYj8IbHCLb7tkm+RsMRBvc:m0OEltc7dyEv97jYfRk1mMRB

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies WinLogon for persistence

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

    • Target

      arrow/59a734c5ae920f5791ace8728981fffe7c9f9270fe26c27c9482dde038dd398c.bin

    • Size

      138KB

    • MD5

      bdc72c4851b8543f9f57215f1a3fc336

    • SHA1

      b04f8b232040200d68a75400c5e160d0f61387f7

    • SHA256

      59a734c5ae920f5791ace8728981fffe7c9f9270fe26c27c9482dde038dd398c

    • SHA512

      884be565c02616d79feea31aaa2d13926e9fe530ed656a31595d2f295c346867cf4f4c313350b695d3f8b30e56c625995e360e50820bccc605e915ab3cd68599

    • SSDEEP

      3072:6bvu5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Y/:6bvqS7BqjjYHdrqkL/

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

    • Target

      arrow/5a45e4a32a4f2081b33dee2ab94eb3ebb4afafe0bd8f5b76e93dfe975c4a607c.bin

    • Size

      138KB

    • MD5

      2f73fdfb8140276968f2c1b358e5edf0

    • SHA1

      160ec42cd31c98fdd91c8a837be32757b2b9af92

    • SHA256

      5a45e4a32a4f2081b33dee2ab94eb3ebb4afafe0bd8f5b76e93dfe975c4a607c

    • SHA512

      65c2ac40557d94cf715d720a3774547f10253fe00071cd6e1824f6304f02187e26184b7c064e8c5d0526bd8650e5854bae283cb080ea17ef3d007f28b0d477f3

    • SSDEEP

      3072:+bvY5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Yh:+bvwS7BqjjYHdrqkL/

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

    • Target

      arrow/5d573461fbe87a4441a12b5b61a3b74019aa21a784f9cf4410e1da100a55c792.bin

    • Size

      138KB

    • MD5

      7b2ec8aedfd42a95a5994dff19115471

    • SHA1

      f51aa65fc904272a1e344a57c436ba8632065b6c

    • SHA256

      5d573461fbe87a4441a12b5b61a3b74019aa21a784f9cf4410e1da100a55c792

    • SHA512

      1f5a313bf59129967db3e6f515edb364bde5c3d66c8cd67f27f79ff65cfdd8f982a68c3934e7574709ab71608c5d877d30f8ac8dc3986dd03523d8f6ad2caada

    • SSDEEP

      3072:2bvik5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Y+:2bv5S7BqjjYHdrqkL/

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

    • Target

      arrow/65403a8b9ecca912ea5cfa91aecdbe77c23e652e4c7465efded126c74711f65e.bin

    • Size

      138KB

    • MD5

      11b99c53b1e6030355af231a3a7fa65b

    • SHA1

      50b4a627dd808c1e332c2803286234f37e46bc2d

    • SHA256

      65403a8b9ecca912ea5cfa91aecdbe77c23e652e4c7465efded126c74711f65e

    • SHA512

      33a134c15708651e725daf0c834a01d970718f90109db275c38dbfd0501486c126d0566ab61cc55f4f47c3e7988483b7b445101b11388cff6399f4815ec63764

    • SSDEEP

      3072:KbvC5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/YP:KbvuS7BqjjYHdrqkL/

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

    • Target

      arrow/8a3d555c8d1019b6d42721a2eea770d2101458fd70b208f6767db2eeb1cd44bc.bin

    • Size

      138KB

    • MD5

      d0488c635bdf39e3670bccb70e240ef9

    • SHA1

      3deb0acc0a9d72202e38d1afcae265d4671489d8

    • SHA256

      8a3d555c8d1019b6d42721a2eea770d2101458fd70b208f6767db2eeb1cd44bc

    • SHA512

      4370af21751cceffcbcdf37e9a6f36e404fd6eaab649e3dcb52a37fc0ee11c854539e08a711975f907b1c1ff577b9b13a659dfd0d008b089c26f85501e79a94f

    • SSDEEP

      3072:Obvt5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/YG:Obv7S7BqjjYHdrqkL/

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

    • Target

      arrow/a1923ce6f95ba7e57b9d8ea27c1867283cacbc992a0f9e16ec9dd864930d9d71.bin

    • Size

      2.2MB

    • MD5

      286de0123129cb1bdb0533301f435746

    • SHA1

      28887e5a7c28661db7b3d4da3612bafd05604813

    • SHA256

      a1923ce6f95ba7e57b9d8ea27c1867283cacbc992a0f9e16ec9dd864930d9d71

    • SHA512

      07da8387eeffada23d39eed1390972e37031ea72a2f8a046027ac160f8ecef81ba3011698dac5fafc5114fe688796b1bc7c4df8a283dc1e23f76f0a2faf0b0bc

    • SSDEEP

      49152:IhgaZCojYG3CmQYbfHxDJ6aiyc7jntoe:IhggwdY7d0tV

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      arrow/b20df532e15674feb9da8728664caa14c6447f4473f2d64f6052de6af0737b3f.bin

    • Size

      158KB

    • MD5

      4952a2b2bd5b557db6798946e03b8264

    • SHA1

      80689d4742b237456dbaf2f5129a9452d18a02b4

    • SHA256

      b20df532e15674feb9da8728664caa14c6447f4473f2d64f6052de6af0737b3f

    • SHA512

      363178c39a43c7048a264a9d6aa0f64bc25a3b4ab752dd411dac40eef4acdec309d11ade25c6ae3e3ef50398d35ac36cecc302582ace0fd2b34b471e1f0b0bcd

    • SSDEEP

      3072:VbRJ+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPl8a8Y:VbR80ODhTEPgnjuIJzo+PPcfPt8

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks

static1

krck1rag35pwil61hby905dc9g7dxwratarrowrat clients0xu9g7ojg36cwq0csg41iuhu21ltx5clientthemidap6yjefarrowratarrowratasyncrat
Score
10/10

behavioral1

arrowratkrck1rpersistencerat
Score
10/10

behavioral2

arrowratkrck1rpersistencerat
Score
10/10

behavioral3

arrowratag35pwpersistencerat
Score
10/10

behavioral4

arrowratag35pwpersistencerat
Score
10/10

behavioral5

arrowratil61hbpersistencerat
Score
10/10

behavioral6

arrowratil61hbpersistencerat
Score
10/10

behavioral7

arrowraty905dcpersistencerat
Score
10/10

behavioral8

arrowraty905dcpersistencerat
Score
10/10

behavioral9

Score
3/10

behavioral10

Score
7/10

behavioral11

arrowrat9g7dxwpersistencerat
Score
10/10

behavioral12

arrowrat9g7dxwpersistencerat
Score
10/10

behavioral13

asyncratarrowrat clientsrat
Score
10/10

behavioral14

asyncratarrowrat clientsrat
Score
10/10

behavioral15

Score
3/10

behavioral16

Score
7/10

behavioral17

arrowratcompanypersistencerat
Score
10/10

behavioral18

arrowratcompanypersistencerat
Score
10/10

behavioral19

arrowrat0xu9g7persistencerat
Score
10/10

behavioral20

arrowrat0xu9g7persistencerat
Score
10/10

behavioral21

arrowratojg36cpersistencerat
Score
10/10

behavioral22

arrowratojg36cpersistencerat
Score
10/10

behavioral23

arrowratwq0csgpersistencerat
Score
10/10

behavioral24

arrowratwq0csgpersistencerat
Score
10/10

behavioral25

arrowrat41iuhupersistencerat
Score
10/10

behavioral26

arrowrat41iuhupersistencerat
Score
10/10

behavioral27

arrowrat21ltx5persistencerat
Score
10/10

behavioral28

arrowrat21ltx5persistencerat
Score
10/10

behavioral29

arrowratclientpersistencerat
Score
10/10

behavioral30

Score
7/10

behavioral31

arrowratclientpersistencerat
Score
10/10

behavioral32

arrowratclientpersistencerat
Score
10/10