General

  • Target

    72cabad77d69e7701af2d31218ac4b7e.bin

  • Size

    158KB

  • Sample

    240703-c2dswsxdjq

  • MD5

    72cabad77d69e7701af2d31218ac4b7e

  • SHA1

    e781c9c87a30163cdef9b5f6f419c27f26e8f271

  • SHA256

    7f8cb35c0290b33bcb49876680340b63061a3fc1558c372a42d87ec21c03ed66

  • SHA512

    709ad82ff09dc32dac22e8aa431833b885f8df4a2e61279fde90b7dad771d55b9a318372d645b8538dee0fdb4aeaed36c1408be00f27c102734aad8bb83a067c

  • SSDEEP

    3072:LbzQH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPjBO8Y:LbzQe0ODhTEPgnjuIJzo+PPcfPjM8

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

single-point.gl.at.ply.gg:48752

Mutex

NuBrONaJi

Targets

    • Target

      72cabad77d69e7701af2d31218ac4b7e.bin

    • Size

      158KB

    • MD5

      72cabad77d69e7701af2d31218ac4b7e

    • SHA1

      e781c9c87a30163cdef9b5f6f419c27f26e8f271

    • SHA256

      7f8cb35c0290b33bcb49876680340b63061a3fc1558c372a42d87ec21c03ed66

    • SHA512

      709ad82ff09dc32dac22e8aa431833b885f8df4a2e61279fde90b7dad771d55b9a318372d645b8538dee0fdb4aeaed36c1408be00f27c102734aad8bb83a067c

    • SSDEEP

      3072:LbzQH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPjBO8Y:LbzQe0ODhTEPgnjuIJzo+PPcfPjM8

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Active Setup

1
T1547.014

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Active Setup

1
T1547.014

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks