General
-
Target
Client.exe
-
Size
158KB
-
Sample
241102-wharns1gmk
-
MD5
3301ae650283538d07ce86b24ee3fe9b
-
SHA1
6a7a80c7094b14c4c905ad48f0308b5b7bd49f42
-
SHA256
2546c02930cc08af5cff35a94d0501f8c0fecb64f1f215c03da6f0b58c1dce40
-
SHA512
f844169694e0390addd8e889c6d3c6df3d8ac815caec5cef329eac01b90cda647b772192facfdf7487b131e7054d04ee104ba849e1bbdd453b5357d203e0fba7
-
SSDEEP
3072:wbz8H+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPHdO8Y:wbz8e0ODhTEPgnjuIJzo+PPcfPHQ8
Malware Config
Extracted
arrowrat
Client
options-printing.gl.at.ply.gg:4449
KzvKtMMlK
Targets
-
-
Target
Client.exe
-
Size
158KB
-
MD5
3301ae650283538d07ce86b24ee3fe9b
-
SHA1
6a7a80c7094b14c4c905ad48f0308b5b7bd49f42
-
SHA256
2546c02930cc08af5cff35a94d0501f8c0fecb64f1f215c03da6f0b58c1dce40
-
SHA512
f844169694e0390addd8e889c6d3c6df3d8ac815caec5cef329eac01b90cda647b772192facfdf7487b131e7054d04ee104ba849e1bbdd453b5357d203e0fba7
-
SSDEEP
3072:wbz8H+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPHdO8Y:wbz8e0ODhTEPgnjuIJzo+PPcfPHQ8
-
Arrowrat family
-
Modifies WinLogon for persistence
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1