General

  • Target

    file.exe

  • Size

    158KB

  • Sample

    230620-bb3hwshb76

  • MD5

    1a6204ba18ed28ba84ae8a3299602bc8

  • SHA1

    ca32927f6e8d86e326fda075f096b16fae482c88

  • SHA256

    90093c647c4ef8f612e3e470c93debfb667aaf39073cd503cd670c6355dc474a

  • SHA512

    375d332c572066e9296b8f87a0bf62309db02f6f82dc91c300099e3d7e3a004a9987b88c58ff1114fcf6588d960ef41b296eaed69db1a5cc0b8b78c7f546641c

  • SSDEEP

    3072:gbzZDH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPjSO8Y:gbzZDe0ODhTEPgnjuIJzo+PPcfPjN8

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

3.142.167.4:14894

Mutex

LFqZKjDAo

Targets

    • Target

      file.exe

    • Size

      158KB

    • MD5

      1a6204ba18ed28ba84ae8a3299602bc8

    • SHA1

      ca32927f6e8d86e326fda075f096b16fae482c88

    • SHA256

      90093c647c4ef8f612e3e470c93debfb667aaf39073cd503cd670c6355dc474a

    • SHA512

      375d332c572066e9296b8f87a0bf62309db02f6f82dc91c300099e3d7e3a004a9987b88c58ff1114fcf6588d960ef41b296eaed69db1a5cc0b8b78c7f546641c

    • SSDEEP

      3072:gbzZDH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPjSO8Y:gbzZDe0ODhTEPgnjuIJzo+PPcfPjN8

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks