General

  • Target

    3dbd1065734c9b3e603bc2a81dbadb77beeb54c6a918a6a4ae0687659ac3c0fb.exe

  • Size

    138KB

  • Sample

    240204-yh1n7sbedn

  • MD5

    7da02064216481c00e88ca35db73c247

  • SHA1

    99983e91bc7511fcb650c31c26a33b581e242913

  • SHA256

    3dbd1065734c9b3e603bc2a81dbadb77beeb54c6a918a6a4ae0687659ac3c0fb

  • SHA512

    df61e4e5226cf035592ec464b68452507df4178edac853329cda8e0fe06102f8eae65bd9d7a6b68d835e2d7ef4ed3748ccd8bc1ed918eb2a85fb9788e5aafae6

  • SSDEEP

    3072:LbvJ5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/YK:Lbv3S7BqjjYHdrqkL/

Malware Config

Extracted

Family

arrowrat

Botnet

9G7DXW

C2

51.178.165.162:1338

Mutex

Q2909Q

Targets

    • Target

      3dbd1065734c9b3e603bc2a81dbadb77beeb54c6a918a6a4ae0687659ac3c0fb.exe

    • Size

      138KB

    • MD5

      7da02064216481c00e88ca35db73c247

    • SHA1

      99983e91bc7511fcb650c31c26a33b581e242913

    • SHA256

      3dbd1065734c9b3e603bc2a81dbadb77beeb54c6a918a6a4ae0687659ac3c0fb

    • SHA512

      df61e4e5226cf035592ec464b68452507df4178edac853329cda8e0fe06102f8eae65bd9d7a6b68d835e2d7ef4ed3748ccd8bc1ed918eb2a85fb9788e5aafae6

    • SSDEEP

      3072:LbvJ5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/YK:Lbv3S7BqjjYHdrqkL/

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies WinLogon for persistence

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks