General
-
Target
Client.exe
-
Size
158KB
-
Sample
240801-ltl9qsvblk
-
MD5
5e59614770589b6f9ccd26931cedbf45
-
SHA1
dc5ee9bcda9d90c24574b9e420842c9a8789f1a3
-
SHA256
66475b24c13dab1ac718c17eb8a36a19c965144026c87ab504a73ced3896e43c
-
SHA512
2a8eaf627a11962ae5de96c6d2147c45094ecac1a547560aed8d451341998b1b0a7dbcdc957bee98b3bb270d5538129d12e53c6758129fc28cca250b064e2d34
-
SSDEEP
3072:HbzFH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfP6ZO8Y:HbzFe0ODhTEPgnjuIJzo+PPcfP608
Behavioral task
behavioral1
Sample
Client.exe
Resource
win10v2004-20240730-en
Malware Config
Extracted
arrowrat
Windows Anti Virus Detections
and-statements.gl.at.ply.gg2a04:4a43:976f:fbc4:a03b:6599:d257:fc04:43442
xNageaqsy
Targets
-
-
Target
Client.exe
-
Size
158KB
-
MD5
5e59614770589b6f9ccd26931cedbf45
-
SHA1
dc5ee9bcda9d90c24574b9e420842c9a8789f1a3
-
SHA256
66475b24c13dab1ac718c17eb8a36a19c965144026c87ab504a73ced3896e43c
-
SHA512
2a8eaf627a11962ae5de96c6d2147c45094ecac1a547560aed8d451341998b1b0a7dbcdc957bee98b3bb270d5538129d12e53c6758129fc28cca250b064e2d34
-
SSDEEP
3072:HbzFH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfP6ZO8Y:HbzFe0ODhTEPgnjuIJzo+PPcfP608
-
Modifies WinLogon for persistence
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1