General

  • Target

    Client.exe

  • Size

    158KB

  • Sample

    230813-ylqcmsga2t

  • MD5

    c7c699eb8695a564fe0b400b1bf138ba

  • SHA1

    52e3be4428c5c2b42d64ba9bcc584472391157c5

  • SHA256

    0351128bc2273d12ca8042b029f9081c9205e2adad3a12f70a5696d23a6a036e

  • SHA512

    94c24a31cbf13d96fa0922769faa7210f0994dba80886591401b722808009301dee2ae9a0ff0386381f26e93f9e88713c0c3a3d73b4e3908b04094dfa6d97ba4

  • SSDEEP

    3072:TbzWH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPfOO8Y:TbzWe0ODhTEPgnjuIJzo+PPcfPfB8

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

147.185.221.16:24073

Mutex

GoeUqgRRx

Targets

    • Target

      Client.exe

    • Size

      158KB

    • MD5

      c7c699eb8695a564fe0b400b1bf138ba

    • SHA1

      52e3be4428c5c2b42d64ba9bcc584472391157c5

    • SHA256

      0351128bc2273d12ca8042b029f9081c9205e2adad3a12f70a5696d23a6a036e

    • SHA512

      94c24a31cbf13d96fa0922769faa7210f0994dba80886591401b722808009301dee2ae9a0ff0386381f26e93f9e88713c0c3a3d73b4e3908b04094dfa6d97ba4

    • SSDEEP

      3072:TbzWH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPfOO8Y:TbzWe0ODhTEPgnjuIJzo+PPcfPfB8

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks