General
-
Target
79ec7c271adcd148064e5324c66d8ea9c1eefd81c44bde7c9ca754f4fb9d80b3.zip
-
Size
78KB
-
Sample
250208-skr7ystjfp
-
MD5
f71ab3d0d751df0f11b68eca80ddd81c
-
SHA1
be19a278805ceadd26d379afafbce874be9526ea
-
SHA256
f9751562f934104cb3887e7a5da1cae472dbd2ea25d99fa2437aa59322088653
-
SHA512
e379cd9c64e9b9621e23c5d08fa184640e3a597ef879c36abbd3fd852a0b3257b448b148aa890bdbabd74d612f24246a0a5bd4aec3adf5ebaf1a8704a4a76690
-
SSDEEP
1536:3w0vnCoSzqPdkT7mnvltLOR+GQ78wjzHRjzSZUlb5gxXMXbghnvQA4:3w0azzqS74bmT+8wHHBm8bidMrghz4
Behavioral task
behavioral1
Sample
79ec7c271adcd148064e5324c66d8ea9c1eefd81c44bde7c9ca754f4fb9d80b3.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
79ec7c271adcd148064e5324c66d8ea9c1eefd81c44bde7c9ca754f4fb9d80b3.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
arrowrat
Client
192.168.1.222:1337
gWyxhRMMH
Targets
-
-
Target
79ec7c271adcd148064e5324c66d8ea9c1eefd81c44bde7c9ca754f4fb9d80b3.exe
-
Size
158KB
-
MD5
7e139460393ef5092b11eff0adbd46f8
-
SHA1
5ae92024865a0a52f76898327780e21304d3e35f
-
SHA256
79ec7c271adcd148064e5324c66d8ea9c1eefd81c44bde7c9ca754f4fb9d80b3
-
SHA512
a852f02e3528ec4bfa3de2aae232acf7a78474303b6221c64965a3eaec55a7e4636cb2fad2e936346dc5e374ec589406b99a68b390dd19a7d1f63b7821fe19ae
-
SSDEEP
3072:MbztH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPWOO8Y:Mbzte0ODhTEPgnjuIJzo+PPcfPWB8
Score10/10-
Arrowrat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-