General

  • Target

    123e3be67c4e5b88d9cb57c0c44e8574e2e260198e42d7882a974d5575c83c90.zip

  • Size

    799KB

  • Sample

    240924-pvmhnsycqh

  • MD5

    6522a23e7b29c59f3ac438a1159fef4e

  • SHA1

    cc9a93df2a4cc1cd884a88818124a550b5846214

  • SHA256

    123e3be67c4e5b88d9cb57c0c44e8574e2e260198e42d7882a974d5575c83c90

  • SHA512

    261e8ff11fc7dba2a6c1f863e7fae4a04f38d07f1b79b198088ac1e19ca2ab48b69aae47ce9eae593a9c3253769ec17d25007664664361ec8ce6184836c9b701

  • SSDEEP

    12288:7VVVY2wENhft+6rmKvoheuU0tJL8+MoRy0Glaos:7e2RNNk6vwQM77MoRiRs

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

vncnew1984.duckdns.org:1984

Mutex

ecZCILAfG

Targets

    • Target

      jkoi.exe

    • Size

      300.0MB

    • MD5

      135b97e053b660f8e6cacd58965b93cd

    • SHA1

      828e92ad30ac243ec063252a338519e4429940e3

    • SHA256

      e659861670260fa5252d5315d71466659e321a90a357aa3005304f145c4a2027

    • SHA512

      6b19d2143f021feeccf5833b57fff55fbae3c72ea0eb480a893b48acd9ce2bdb0c895cd3516133436b4e937f97ee4e42ce58b4aa3729d1f3c29fa837bc19366c

    • SSDEEP

      12288:VD9TFmMwfrck/YEwEVhftq6rmIGD9P5X5U4LVkYdS7Ffi:KgERVNQ6Fq9hX5U4L94Zi

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks