Rewterz Threat Alert – Cybersecurity Agency Warns of Fatal Potential of Royal Ransomware – Active IOCs
March 6, 2023Rewterz Threat Alert – China’s Threat Actor Group BlackFly Targets Materials Sector – Active IOCs
March 6, 2023Rewterz Threat Alert – Cybersecurity Agency Warns of Fatal Potential of Royal Ransomware – Active IOCs
March 6, 2023Rewterz Threat Alert – China’s Threat Actor Group BlackFly Targets Materials Sector – Active IOCs
March 6, 2023March 5, 2023
Severity
High
Analysis Summary
ArrowRAT is a type of remote access trojan (RAT) malware that is designed to infiltrate a computer system and steal sensitive information. It is typically spread through phishing emails containing malicious attachments or links to infected websites. Once it infects a system, it can give attackers complete control over the system and collect information such as login credentials, banking information, and personal data. ArrowRAT can also install additional malware or allow attackers to execute commands remotely.
ArrowRAT has a Hidden Virtual Network Computing (HVNC) module, which allows attackers with limited computing abilities to launch a hidden virtual desktop on compromised PCs. ArrowRAT can be utilized to get access to several browsers like Chrome, Firefox, Brave, and email clients.
To protect against Arrowrat and other types of malware, it is important to keep your computer’s operating system and security software up to date, be cautious when opening email attachments or clicking on links, and avoid downloading software or files from untrusted sources.
Impact
- Credential Theft
- Identity Theft
- Monetary Loss
Indicators of Compromise
MD5
- e22c97f1931fdec29962ae778c5b44c3
- bdc72c4851b8543f9f57215f1a3fc336
- fcc0c059b3a4b6f9f865fcde362b9acb
- 2f73fdfb8140276968f2c1b358e5edf0
SHA-256
- 2380ff875da958af3a345764860a8d70761bdc4f9feb20c1b183a83b9cae1b0c
- 59a734c5ae920f5791ace8728981fffe7c9f9270fe26c27c9482dde038dd398c
- 17a76858f5bba3812b8f429e261ba0e84baf8197fe1f4478aa6c7adc5d8dd6ff
- 5a45e4a32a4f2081b33dee2ab94eb3ebb4afafe0bd8f5b76e93dfe975c4a607c
SHA-1
- 7b0587f698a12619a735ce2536ec6a298ac92874
- b04f8b232040200d68a75400c5e160d0f61387f7
- 23edfe65a519d095ca11f3987bfe6de661953f49
- 160ec42cd31c98fdd91c8a837be32757b2b9af92
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.