General
-
Target
PandoraClient.exe
-
Size
158KB
-
Sample
230327-sxdkbsgb5y
-
MD5
b35a8f2e642d254ad7bcbbc1940e2636
-
SHA1
6d665d7a99778ed39b0c00d260a511c60b952bc8
-
SHA256
1d67d84f26844c5482f8fc9ca6058ad5f4163b7f8707c41f550f2f00343c685a
-
SHA512
14b16590238f33a2230b01e1ae06b47555f857fd5c960241178a61204a156c209c31feadb66585d5bdab67f451461a8421b33c83ba19d2298a94460d394968fb
-
SSDEEP
3072:hbzhL+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPEfO8Y:hbzhC0ODhTEPgnjuIJzo+PPcfPEW8
Behavioral task
behavioral1
Sample
PandoraClient.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
arrowrat
Client
soon-lp.at.ply.gg:17209
lPkPZDtPb
Targets
-
-
Target
PandoraClient.exe
-
Size
158KB
-
MD5
b35a8f2e642d254ad7bcbbc1940e2636
-
SHA1
6d665d7a99778ed39b0c00d260a511c60b952bc8
-
SHA256
1d67d84f26844c5482f8fc9ca6058ad5f4163b7f8707c41f550f2f00343c685a
-
SHA512
14b16590238f33a2230b01e1ae06b47555f857fd5c960241178a61204a156c209c31feadb66585d5bdab67f451461a8421b33c83ba19d2298a94460d394968fb
-
SSDEEP
3072:hbzhL+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPEfO8Y:hbzhC0ODhTEPgnjuIJzo+PPcfPEW8
Score10/10-
Modifies WinLogon for persistence
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-