General
-
Target
Client.exe
-
Size
158KB
-
Sample
240227-2mdl1sdc93
-
MD5
e342241a46ccb69a5e50aab1c3910172
-
SHA1
63f28e0544c4689fc934e61269c5b5c47e8585a8
-
SHA256
6e720a7d86006e8cc69a9edf11e3e78608061cf606eca26d235db6282b002b97
-
SHA512
98a799f600c4562228d5f6b3c431bffac7595908dbffa6484995fe5b958656eb31c9b42dd873f72aa49feec203e8db16c384dccaeb377d34f55beeffc7b8ceda
-
SSDEEP
3072:qbzmH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPGKO8Y:qbzme0ODhTEPgnjuIJzo+PPcfPG18
Behavioral task
behavioral1
Sample
Client.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
arrowrat
Client
185.103.101.105:1337
VzRgLAhmN
Targets
-
-
Target
Client.exe
-
Size
158KB
-
MD5
e342241a46ccb69a5e50aab1c3910172
-
SHA1
63f28e0544c4689fc934e61269c5b5c47e8585a8
-
SHA256
6e720a7d86006e8cc69a9edf11e3e78608061cf606eca26d235db6282b002b97
-
SHA512
98a799f600c4562228d5f6b3c431bffac7595908dbffa6484995fe5b958656eb31c9b42dd873f72aa49feec203e8db16c384dccaeb377d34f55beeffc7b8ceda
-
SSDEEP
3072:qbzmH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPGKO8Y:qbzme0ODhTEPgnjuIJzo+PPcfPG18
Score10/10-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-