General

  • Target

    Client.exe

  • Size

    158KB

  • MD5

    330f9ca88df2bb08b5d92df02830a8ab

  • SHA1

    1d94ac49a57ea8c5a77c15b0f9252528f4d429f9

  • SHA256

    8a032aa8eba9f5f0727f26ec74ca3dff029955ae6be9c1e7b7a7a84c41820910

  • SHA512

    aa8d9d9fe801315472bfaada35a56dfc6c64ba0d7cfd9a467858eb2797e365bbc69de4c2afba5667abf6304a266dbeed1a8e13b39a86d2c6b884d12069113f39

  • SSDEEP

    3072:gbzRH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfP+iO8Y:gbzRe0ODhTEPgnjuIJzo+PPcfP+d8

Score
10/10

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

6.tcp.eu.ngrok.io:13114:4444

Mutex

IpVAZHAys

Signatures

  • Arrowrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Client.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections