General
-
Target
Client.exe
-
Size
158KB
-
Sample
240618-z3txts1clj
-
MD5
332bc09f4e96b4c92fba644fa6b49585
-
SHA1
56fe70b2cfa0507fd1c6cb67b7456bba2e93bc39
-
SHA256
876f5ce0e85c7bd4fd29f3b29333e3b6d130306a53ba4a9dff02151cfc8bda63
-
SHA512
49c0a97e8f2b4a11f0261722c1c8495f9d8d438ad63a6f0f4bef0661b4ff2f05a0672caf6264d7d03fe91752def7d346b7d0ad752a0f9f8296859a543c7d10fa
-
SSDEEP
3072:MbzgH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPUJO8Y:Mbzge0ODhTEPgnjuIJzo+PPcfPUk8
Behavioral task
behavioral1
Sample
Client.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Client.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Client.exe
Resource
win11-20240419-en
Malware Config
Extracted
arrowrat
Client
runderscore00-37568.portmap.host:37568
qxzqapnkK
Targets
-
-
Target
Client.exe
-
Size
158KB
-
MD5
332bc09f4e96b4c92fba644fa6b49585
-
SHA1
56fe70b2cfa0507fd1c6cb67b7456bba2e93bc39
-
SHA256
876f5ce0e85c7bd4fd29f3b29333e3b6d130306a53ba4a9dff02151cfc8bda63
-
SHA512
49c0a97e8f2b4a11f0261722c1c8495f9d8d438ad63a6f0f4bef0661b4ff2f05a0672caf6264d7d03fe91752def7d346b7d0ad752a0f9f8296859a543c7d10fa
-
SSDEEP
3072:MbzgH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPUJO8Y:Mbzge0ODhTEPgnjuIJzo+PPcfPUk8
Score10/10-
Modifies WinLogon for persistence
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1