General

  • Target

    PandoraClient.exe

  • Size

    158KB

  • Sample

    230327-sxdkbsgb5y

  • MD5

    b35a8f2e642d254ad7bcbbc1940e2636

  • SHA1

    6d665d7a99778ed39b0c00d260a511c60b952bc8

  • SHA256

    1d67d84f26844c5482f8fc9ca6058ad5f4163b7f8707c41f550f2f00343c685a

  • SHA512

    14b16590238f33a2230b01e1ae06b47555f857fd5c960241178a61204a156c209c31feadb66585d5bdab67f451461a8421b33c83ba19d2298a94460d394968fb

  • SSDEEP

    3072:hbzhL+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPEfO8Y:hbzhC0ODhTEPgnjuIJzo+PPcfPEW8

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

soon-lp.at.ply.gg:17209

Mutex

lPkPZDtPb

Targets

    • Target

      PandoraClient.exe

    • Size

      158KB

    • MD5

      b35a8f2e642d254ad7bcbbc1940e2636

    • SHA1

      6d665d7a99778ed39b0c00d260a511c60b952bc8

    • SHA256

      1d67d84f26844c5482f8fc9ca6058ad5f4163b7f8707c41f550f2f00343c685a

    • SHA512

      14b16590238f33a2230b01e1ae06b47555f857fd5c960241178a61204a156c209c31feadb66585d5bdab67f451461a8421b33c83ba19d2298a94460d394968fb

    • SSDEEP

      3072:hbzhL+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPEfO8Y:hbzhC0ODhTEPgnjuIJzo+PPcfPEW8

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Modifies WinLogon for persistence

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

2
T1120

Tasks