General

  • Target

    Client.exe

  • Size

    158KB

  • MD5

    ae1a31fccddf3c728479e181ee16c74b

  • SHA1

    767c87adcd18546e3ae40d781579071f7f8035a2

  • SHA256

    279e15cb4ddbb440f1dbffe4f8af8430201971d59c1f40a58a12f81e4f59b342

  • SHA512

    9343ad9da7db4a6f8eb2bd78505bcce18d026de7cdc520864090b130d8d395b0edfc26c456bb4ec554cbd7473ea8cb14302b5a4e91a2072f81f219c97cc81905

  • SSDEEP

    3072:TbzmH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPP1O8Y:Tbzme0ODhTEPgnjuIJzo+PPcfPPY8

Score
10/10

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

6.tcp.eu.ngrok.io:19154

Mutex

Runtime Broker

Signatures

  • Arrowrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Client.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections