General

  • Target

    Client.exe

  • Size

    158KB

  • Sample

    241207-nb1qhswjer

  • MD5

    36ab548437e027b2a9c21c6f3d48d8a5

  • SHA1

    313bb9928462f8af38f29a2795bcf343cd463931

  • SHA256

    02226ca30c6b957fdf3a45bebd3cd328034c106ea8438891012aeec83bd4bdd2

  • SHA512

    87f391c184a59a126ec2188e2c5e7f00de1f8ff5f859bf3e218158f136ac24dccfff24b6a9d7da7670f04d5efe00b8056db9b76abdcb363c56450330203537a7

  • SSDEEP

    3072:hbzsH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfP4qO8Y:hbzse0ODhTEPgnjuIJzo+PPcfP4V8

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

193.161.193.99:14679

Mutex

wKuPZSZMR

Targets

    • Target

      Client.exe

    • Size

      158KB

    • MD5

      36ab548437e027b2a9c21c6f3d48d8a5

    • SHA1

      313bb9928462f8af38f29a2795bcf343cd463931

    • SHA256

      02226ca30c6b957fdf3a45bebd3cd328034c106ea8438891012aeec83bd4bdd2

    • SHA512

      87f391c184a59a126ec2188e2c5e7f00de1f8ff5f859bf3e218158f136ac24dccfff24b6a9d7da7670f04d5efe00b8056db9b76abdcb363c56450330203537a7

    • SSDEEP

      3072:hbzsH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfP4qO8Y:hbzse0ODhTEPgnjuIJzo+PPcfP4V8

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Arrowrat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks