General

  • Target

    Client.exe

  • Size

    158KB

  • Sample

    241105-kme2eaxhle

  • MD5

    648c702925548284a6455ccad0393887

  • SHA1

    9dacf5df7f98ad089fa5b75ec5c2e699e75c07f8

  • SHA256

    b4b5626f40c75e92f91e0d98e7250827f3080b1c268b9861fdd37e05928359c1

  • SHA512

    026b9d65c29254bc3375e0d7bdd593ec2cfe554036c121da0d29f87a752ec807ca771a93ecb419d0db355e469d4ce3029854ce2446b1af9f5dbd6cdc0d35d55f

  • SSDEEP

    3072:7bzIH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPkqO8Y:7bzIe0ODhTEPgnjuIJzo+PPcfPkV8

Malware Config

Extracted

Family

arrowrat

Botnet

Skibidia

C2

147.185.221.23:49157

Mutex

NDKfDLExh

Targets

    • Target

      Client.exe

    • Size

      158KB

    • MD5

      648c702925548284a6455ccad0393887

    • SHA1

      9dacf5df7f98ad089fa5b75ec5c2e699e75c07f8

    • SHA256

      b4b5626f40c75e92f91e0d98e7250827f3080b1c268b9861fdd37e05928359c1

    • SHA512

      026b9d65c29254bc3375e0d7bdd593ec2cfe554036c121da0d29f87a752ec807ca771a93ecb419d0db355e469d4ce3029854ce2446b1af9f5dbd6cdc0d35d55f

    • SSDEEP

      3072:7bzIH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPkqO8Y:7bzIe0ODhTEPgnjuIJzo+PPcfPkV8

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Arrowrat family

    • Modifies WinLogon for persistence

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks