General

  • Target

    7a1169c28429d01bf8437122048fee12b9c8bdeae7eb49bd3d4e61965b294fd7

  • Size

    832KB

  • Sample

    231014-dq3tbafc36

  • MD5

    cee43141a4dc4efa97ff3053adb65ae5

  • SHA1

    840b6edd286c3652795a6e33f531bbede7ed4982

  • SHA256

    7a1169c28429d01bf8437122048fee12b9c8bdeae7eb49bd3d4e61965b294fd7

  • SHA512

    7f3ba4bfe5230bd44b291ca62316eb46fefb8db280fb8018ab68ebc6994546091934691f5b7e690b13109db0d043306be1aeb613934f88480e3ecb17508116ec

  • SSDEEP

    24576:OuuKylR92d9oZs5BFuuKylR92d9oZs5BU:CPlL2d9lDzPlL2d9lDU

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

192.159.99.3:1337

Mutex

qawNWRCCU

Targets

    • Target

      MOQ_T7FIBA00541·PDF .scr

    • Size

      670KB

    • MD5

      48a5e2b45923213e94a82d30db1eb988

    • SHA1

      eb3c3aeb61e6e20b149cbd966f60c81a8215e8b0

    • SHA256

      19fa9896468d7dd79d76fa27b34f66e13b6c5268cdd574c0a78eeb0e3dbeb839

    • SHA512

      13edc7b141a8bd854a07ec70371f6fe59055d1dfe4127e3912992181d983e710f990d0cfcaa294e5da8e37ab757efb93133382625e210c47823885586fc536da

    • SSDEEP

      12288:PBzhfOS3GXJNUwCpoOekXOS6zjwehALsCGlhcBd:phfOS3sJWwvOeYCras

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

    • Target

      ORDER LIST_SEPT7FIBA00541·PDF.scr

    • Size

      670KB

    • MD5

      48a5e2b45923213e94a82d30db1eb988

    • SHA1

      eb3c3aeb61e6e20b149cbd966f60c81a8215e8b0

    • SHA256

      19fa9896468d7dd79d76fa27b34f66e13b6c5268cdd574c0a78eeb0e3dbeb839

    • SHA512

      13edc7b141a8bd854a07ec70371f6fe59055d1dfe4127e3912992181d983e710f990d0cfcaa294e5da8e37ab757efb93133382625e210c47823885586fc536da

    • SSDEEP

      12288:PBzhfOS3GXJNUwCpoOekXOS6zjwehALsCGlhcBd:phfOS3sJWwvOeYCras

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks