General

  • Target

    Client.exe

  • Size

    158KB

  • Sample

    240801-ltl9qsvblk

  • MD5

    5e59614770589b6f9ccd26931cedbf45

  • SHA1

    dc5ee9bcda9d90c24574b9e420842c9a8789f1a3

  • SHA256

    66475b24c13dab1ac718c17eb8a36a19c965144026c87ab504a73ced3896e43c

  • SHA512

    2a8eaf627a11962ae5de96c6d2147c45094ecac1a547560aed8d451341998b1b0a7dbcdc957bee98b3bb270d5538129d12e53c6758129fc28cca250b064e2d34

  • SSDEEP

    3072:HbzFH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfP6ZO8Y:HbzFe0ODhTEPgnjuIJzo+PPcfP608

Malware Config

Extracted

Family

arrowrat

Botnet

Windows Anti Virus Detections

C2

and-statements.gl.at.ply.gg2a04:4a43:976f:fbc4:a03b:6599:d257:fc04:43442

Mutex

xNageaqsy

Targets

    • Target

      Client.exe

    • Size

      158KB

    • MD5

      5e59614770589b6f9ccd26931cedbf45

    • SHA1

      dc5ee9bcda9d90c24574b9e420842c9a8789f1a3

    • SHA256

      66475b24c13dab1ac718c17eb8a36a19c965144026c87ab504a73ced3896e43c

    • SHA512

      2a8eaf627a11962ae5de96c6d2147c45094ecac1a547560aed8d451341998b1b0a7dbcdc957bee98b3bb270d5538129d12e53c6758129fc28cca250b064e2d34

    • SSDEEP

      3072:HbzFH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfP6ZO8Y:HbzFe0ODhTEPgnjuIJzo+PPcfP608

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies WinLogon for persistence

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks