General
-
Target
Client.exe
-
Size
158KB
-
Sample
240803-tb97vayamk
-
MD5
b0e4bd2a0ae239b56802a213e420d374
-
SHA1
7cb945ab693f92094031f99274ce58b5887e54cc
-
SHA256
b3a46d84a821e762923de3ea33e408018c73d739e2ebf10a411f2eddaaff17f1
-
SHA512
da7fd77f9c460e06ca28e97a198a9ba02adda1437daba08c1fd7c5e4456b6ad8d88d4a0ef581e7adf0ba65c686dcfbdd8c3ee0ef4929aa00ab1010866fd640f1
-
SSDEEP
3072:gbzDDH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPiSO8Y:gbzDDe0ODhTEPgnjuIJzo+PPcfPiN8
Behavioral task
behavioral1
Sample
Client.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
arrowrat
Client
147.185.221.21:37029
dqeqvDOqo
Targets
-
-
Target
Client.exe
-
Size
158KB
-
MD5
b0e4bd2a0ae239b56802a213e420d374
-
SHA1
7cb945ab693f92094031f99274ce58b5887e54cc
-
SHA256
b3a46d84a821e762923de3ea33e408018c73d739e2ebf10a411f2eddaaff17f1
-
SHA512
da7fd77f9c460e06ca28e97a198a9ba02adda1437daba08c1fd7c5e4456b6ad8d88d4a0ef581e7adf0ba65c686dcfbdd8c3ee0ef4929aa00ab1010866fd640f1
-
SSDEEP
3072:gbzDDH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPiSO8Y:gbzDDe0ODhTEPgnjuIJzo+PPcfPiN8
-
Modifies WinLogon for persistence
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1