General

  • Target

    bb3cfbb29265e73f8ed5a345274347f7e349435dfd7e2806f05fa90cecc20b5a

  • Size

    90KB

  • Sample

    241031-e3dwdszepb

  • MD5

    ffcc9b9d4ef1f533d2de35bc1e783e7f

  • SHA1

    e102a7c7586f16f93caeac089f3be247a95ff7a1

  • SHA256

    bb3cfbb29265e73f8ed5a345274347f7e349435dfd7e2806f05fa90cecc20b5a

  • SHA512

    0fa343e6fffda0789e8ce6bdaf5dd2cb84d0cdeee190546d0b51aa09a20d3f8aa50be049efec4d9269bdf6ee5af863ace66850a8844d03d1a6e9ac89971c2159

  • SSDEEP

    1536:ebRiQMT57SK3bUzZdQ1iIMvnZlbLxjV3AGq5gWlocT1wzySsd9NJ33c:ebRU57SKsstcnZTJQDgWPaySsdH5s

Malware Config

Extracted

Family

arrowrat

Botnet

ArrowRAT

C2

arwr.duckdns.org:5558

Mutex

wSUudxZaw.exe

Targets

    • Target

      bb3cfbb29265e73f8ed5a345274347f7e349435dfd7e2806f05fa90cecc20b5a

    • Size

      90KB

    • MD5

      ffcc9b9d4ef1f533d2de35bc1e783e7f

    • SHA1

      e102a7c7586f16f93caeac089f3be247a95ff7a1

    • SHA256

      bb3cfbb29265e73f8ed5a345274347f7e349435dfd7e2806f05fa90cecc20b5a

    • SHA512

      0fa343e6fffda0789e8ce6bdaf5dd2cb84d0cdeee190546d0b51aa09a20d3f8aa50be049efec4d9269bdf6ee5af863ace66850a8844d03d1a6e9ac89971c2159

    • SSDEEP

      1536:ebRiQMT57SK3bUzZdQ1iIMvnZlbLxjV3AGq5gWlocT1wzySsd9NJ33c:ebRU57SKsstcnZTJQDgWPaySsdH5s

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Arrowrat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks