General
-
Target
Client.exe
-
Size
158KB
-
Sample
240801-lx8l5svcrn
-
MD5
ed0eb58e701a62ef732db4bb2223565e
-
SHA1
882f556e08047535c88f33eb7a53652134d1081f
-
SHA256
01b5d985ba53c1d789b144694e179d04c8c0ff95e88659ce9e8b9b6e77f357ff
-
SHA512
f7395647176b2a3ff456eda2924bb2fa3fe507bacf93933bfb0588c03a7a87ab8b0339ca2f8b258a9acb7b5d68cd8aae948382251ea274e0dd8d81360890ced2
-
SSDEEP
3072:wbziH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPYdO8Y:wbzie0ODhTEPgnjuIJzo+PPcfPYQ8
Behavioral task
behavioral1
Sample
Client.exe
Resource
win10v2004-20240730-en
Malware Config
Extracted
arrowrat
Client1
and-statements.gl.at.ply.gg:43442
JeaMEllZK
Targets
-
-
Target
Client.exe
-
Size
158KB
-
MD5
ed0eb58e701a62ef732db4bb2223565e
-
SHA1
882f556e08047535c88f33eb7a53652134d1081f
-
SHA256
01b5d985ba53c1d789b144694e179d04c8c0ff95e88659ce9e8b9b6e77f357ff
-
SHA512
f7395647176b2a3ff456eda2924bb2fa3fe507bacf93933bfb0588c03a7a87ab8b0339ca2f8b258a9acb7b5d68cd8aae948382251ea274e0dd8d81360890ced2
-
SSDEEP
3072:wbziH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPYdO8Y:wbzie0ODhTEPgnjuIJzo+PPcfPYQ8
-
Modifies WinLogon for persistence
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1