General

  • Target

    Client.exe

  • Size

    158KB

  • Sample

    240902-wjzgeswapg

  • MD5

    330f9ca88df2bb08b5d92df02830a8ab

  • SHA1

    1d94ac49a57ea8c5a77c15b0f9252528f4d429f9

  • SHA256

    8a032aa8eba9f5f0727f26ec74ca3dff029955ae6be9c1e7b7a7a84c41820910

  • SHA512

    aa8d9d9fe801315472bfaada35a56dfc6c64ba0d7cfd9a467858eb2797e365bbc69de4c2afba5667abf6304a266dbeed1a8e13b39a86d2c6b884d12069113f39

  • SSDEEP

    3072:gbzRH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfP+iO8Y:gbzRe0ODhTEPgnjuIJzo+PPcfP+d8

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

6.tcp.eu.ngrok.io:13114:4444

Mutex

IpVAZHAys

Targets

    • Target

      Client.exe

    • Size

      158KB

    • MD5

      330f9ca88df2bb08b5d92df02830a8ab

    • SHA1

      1d94ac49a57ea8c5a77c15b0f9252528f4d429f9

    • SHA256

      8a032aa8eba9f5f0727f26ec74ca3dff029955ae6be9c1e7b7a7a84c41820910

    • SHA512

      aa8d9d9fe801315472bfaada35a56dfc6c64ba0d7cfd9a467858eb2797e365bbc69de4c2afba5667abf6304a266dbeed1a8e13b39a86d2c6b884d12069113f39

    • SSDEEP

      3072:gbzRH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfP+iO8Y:gbzRe0ODhTEPgnjuIJzo+PPcfP+d8

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies WinLogon for persistence

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks