General

  • Target

    79ec7c271adcd148064e5324c66d8ea9c1eefd81c44bde7c9ca754f4fb9d80b3.zip

  • Size

    78KB

  • Sample

    250208-skr7ystjfp

  • MD5

    f71ab3d0d751df0f11b68eca80ddd81c

  • SHA1

    be19a278805ceadd26d379afafbce874be9526ea

  • SHA256

    f9751562f934104cb3887e7a5da1cae472dbd2ea25d99fa2437aa59322088653

  • SHA512

    e379cd9c64e9b9621e23c5d08fa184640e3a597ef879c36abbd3fd852a0b3257b448b148aa890bdbabd74d612f24246a0a5bd4aec3adf5ebaf1a8704a4a76690

  • SSDEEP

    1536:3w0vnCoSzqPdkT7mnvltLOR+GQ78wjzHRjzSZUlb5gxXMXbghnvQA4:3w0azzqS74bmT+8wHHBm8bidMrghz4

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

192.168.1.222:1337

Mutex

gWyxhRMMH

Targets

    • Target

      79ec7c271adcd148064e5324c66d8ea9c1eefd81c44bde7c9ca754f4fb9d80b3.exe

    • Size

      158KB

    • MD5

      7e139460393ef5092b11eff0adbd46f8

    • SHA1

      5ae92024865a0a52f76898327780e21304d3e35f

    • SHA256

      79ec7c271adcd148064e5324c66d8ea9c1eefd81c44bde7c9ca754f4fb9d80b3

    • SHA512

      a852f02e3528ec4bfa3de2aae232acf7a78474303b6221c64965a3eaec55a7e4636cb2fad2e936346dc5e374ec589406b99a68b390dd19a7d1f63b7821fe19ae

    • SSDEEP

      3072:MbztH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPWOO8Y:Mbzte0ODhTEPgnjuIJzo+PPcfPWB8

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Arrowrat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks