General

  • Target

    ClientH.exe

  • Size

    90KB

  • Sample

    230718-mylz7sad7v

  • MD5

    5ac5cf4a09a5c6dfd82669a0e24f675d

  • SHA1

    4f0993bfd2245da594000bb7c2d2bd7d02b60d53

  • SHA256

    6136b0b9b28b52962f090cdf34ac650c4b184f3a65e863e2051cdc1219aff051

  • SHA512

    e0317cf9a5a495f5e90a88f4a96517626a30c016b7374db41bc79a8bcb0920fcf7691ca3cf48c712b8bc2db075d734ca7cacc771e8f604297600187afe314d3f

  • SSDEEP

    1536:dbRiQMB57SK3bUzZdQ1iIMvnZlbLxjV3AGq5gWlocT1wzySsd9NJ33a:dbRO57SKsstcnZTJQDgWPaySsdH5K

Malware Config

Extracted

Family

arrowrat

Botnet

VenomHVNC

C2

wasted9sss1-57562.portmap.host:57562

Mutex

uSzDNutNI.exe

Targets

    • Target

      ClientH.exe

    • Size

      90KB

    • MD5

      5ac5cf4a09a5c6dfd82669a0e24f675d

    • SHA1

      4f0993bfd2245da594000bb7c2d2bd7d02b60d53

    • SHA256

      6136b0b9b28b52962f090cdf34ac650c4b184f3a65e863e2051cdc1219aff051

    • SHA512

      e0317cf9a5a495f5e90a88f4a96517626a30c016b7374db41bc79a8bcb0920fcf7691ca3cf48c712b8bc2db075d734ca7cacc771e8f604297600187afe314d3f

    • SSDEEP

      1536:dbRiQMB57SK3bUzZdQ1iIMvnZlbLxjV3AGq5gWlocT1wzySsd9NJ33a:dbRO57SKsstcnZTJQDgWPaySsdH5K

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies WinLogon for persistence

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks