General
-
Target
Client.exe
-
Size
158KB
-
Sample
241207-nb1qhswjer
-
MD5
36ab548437e027b2a9c21c6f3d48d8a5
-
SHA1
313bb9928462f8af38f29a2795bcf343cd463931
-
SHA256
02226ca30c6b957fdf3a45bebd3cd328034c106ea8438891012aeec83bd4bdd2
-
SHA512
87f391c184a59a126ec2188e2c5e7f00de1f8ff5f859bf3e218158f136ac24dccfff24b6a9d7da7670f04d5efe00b8056db9b76abdcb363c56450330203537a7
-
SSDEEP
3072:hbzsH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfP4qO8Y:hbzse0ODhTEPgnjuIJzo+PPcfP4V8
Behavioral task
behavioral1
Sample
Client.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
arrowrat
Client
193.161.193.99:14679
wKuPZSZMR
Targets
-
-
Target
Client.exe
-
Size
158KB
-
MD5
36ab548437e027b2a9c21c6f3d48d8a5
-
SHA1
313bb9928462f8af38f29a2795bcf343cd463931
-
SHA256
02226ca30c6b957fdf3a45bebd3cd328034c106ea8438891012aeec83bd4bdd2
-
SHA512
87f391c184a59a126ec2188e2c5e7f00de1f8ff5f859bf3e218158f136ac24dccfff24b6a9d7da7670f04d5efe00b8056db9b76abdcb363c56450330203537a7
-
SSDEEP
3072:hbzsH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfP4qO8Y:hbzse0ODhTEPgnjuIJzo+PPcfP4V8
Score10/10-
Arrowrat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-