General

  • Target

    Client.exe

  • Size

    158KB

  • Sample

    241105-kme2eaxhle

  • MD5

    648c702925548284a6455ccad0393887

  • SHA1

    9dacf5df7f98ad089fa5b75ec5c2e699e75c07f8

  • SHA256

    b4b5626f40c75e92f91e0d98e7250827f3080b1c268b9861fdd37e05928359c1

  • SHA512

    026b9d65c29254bc3375e0d7bdd593ec2cfe554036c121da0d29f87a752ec807ca771a93ecb419d0db355e469d4ce3029854ce2446b1af9f5dbd6cdc0d35d55f

  • SSDEEP

    3072:7bzIH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPkqO8Y:7bzIe0ODhTEPgnjuIJzo+PPcfPkV8

Malware Config

Extracted

Family

arrowrat

Botnet

Skibidia

C2

147.185.221.23:49157

Mutex

NDKfDLExh

Targets

    • Target

      Client.exe

    • Size

      158KB

    • MD5

      648c702925548284a6455ccad0393887

    • SHA1

      9dacf5df7f98ad089fa5b75ec5c2e699e75c07f8

    • SHA256

      b4b5626f40c75e92f91e0d98e7250827f3080b1c268b9861fdd37e05928359c1

    • SHA512

      026b9d65c29254bc3375e0d7bdd593ec2cfe554036c121da0d29f87a752ec807ca771a93ecb419d0db355e469d4ce3029854ce2446b1af9f5dbd6cdc0d35d55f

    • SSDEEP

      3072:7bzIH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPkqO8Y:7bzIe0ODhTEPgnjuIJzo+PPcfPkV8

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Arrowrat family

    • Modifies WinLogon for persistence

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.