General

  • Target

    Client.exe

  • Size

    158KB

  • Sample

    240402-egbtxagd82

  • MD5

    5e22cda2042ee1c0852c8f0e9384568d

  • SHA1

    4da0e3c69e0959d9095698d5de4ca7a0a2a979d1

  • SHA256

    3e4d0107aacb87e46505f2e292962c929229cad6a05e1cc35320cf9bac2429e9

  • SHA512

    bbb4694379297b9f8ee8bb42a0a99a7f4321d2475e028c89ca9b364a3f8661cdc0b24178f0f55af6e8d2726c714a7a76110afef5d029657a48af72f998a12e54

  • SSDEEP

    3072:TbzoH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPZFO8Y:Tbzoe0ODhTEPgnjuIJzo+PPcfPZo8

Malware Config

Extracted

Family

arrowrat

Botnet

DevsWhoFuckDevs

C2

vacation-transferred.gl.at.ply.gg:12652

Mutex

brbqyqTdu

Targets

    • Target

      Client.exe

    • Size

      158KB

    • MD5

      5e22cda2042ee1c0852c8f0e9384568d

    • SHA1

      4da0e3c69e0959d9095698d5de4ca7a0a2a979d1

    • SHA256

      3e4d0107aacb87e46505f2e292962c929229cad6a05e1cc35320cf9bac2429e9

    • SHA512

      bbb4694379297b9f8ee8bb42a0a99a7f4321d2475e028c89ca9b364a3f8661cdc0b24178f0f55af6e8d2726c714a7a76110afef5d029657a48af72f998a12e54

    • SSDEEP

      3072:TbzoH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPZFO8Y:Tbzoe0ODhTEPgnjuIJzo+PPcfPZo8

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks