General
-
Target
file.exe
-
Size
457KB
-
Sample
230628-rre1jahh36
-
MD5
288a04f04d9fc3e84ff5b2402c8050b1
-
SHA1
8e0b920bb33920e298ac9f73ab4b7ea0bbdfdbf2
-
SHA256
cd15fbc9e839dbc2888b3e72c47827e09a8bc50038a509f138c266ebcf2f3ed6
-
SHA512
928b111cfb151ad8967e1bde8e1e17ab592f0312f3883b1faf6578401b49cc741dde7ae426ee1ef7d8c985b3e4d4b287ccabaf01ea3841f8438d4dc993d9b5fb
-
SSDEEP
12288:QkoPbgRuF1R5u7w1eTe5XxLvZNOujzAKv546Q4dPHm:QkEb4E5u7w8Te5XxLhN9l54r4dHm
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
arrowrat
Client
212.224.86.109:1337
mTiBFWwWe
Targets
-
-
Target
file.exe
-
Size
457KB
-
MD5
288a04f04d9fc3e84ff5b2402c8050b1
-
SHA1
8e0b920bb33920e298ac9f73ab4b7ea0bbdfdbf2
-
SHA256
cd15fbc9e839dbc2888b3e72c47827e09a8bc50038a509f138c266ebcf2f3ed6
-
SHA512
928b111cfb151ad8967e1bde8e1e17ab592f0312f3883b1faf6578401b49cc741dde7ae426ee1ef7d8c985b3e4d4b287ccabaf01ea3841f8438d4dc993d9b5fb
-
SSDEEP
12288:QkoPbgRuF1R5u7w1eTe5XxLvZNOujzAKv546Q4dPHm:QkEb4E5u7w8Te5XxLhN9l54r4dHm
Score10/10-
Modifies WinLogon for persistence
-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-