General
-
Target
PandoraClient.exe
-
Size
138KB
-
Sample
230820-12ebeshf78
-
MD5
4649bb4b0cb232966683c589150ff119
-
SHA1
d2165c3988dc382fbf1bfec9828f323a9ac9282b
-
SHA256
41940020b7778a380f4d0907d4a95a8afe2108b3df3f7f73d7847d069ff29dcc
-
SHA512
72061b043678530ab19d6d3438c5cfe9e0d1b653899292191e11dc9bae1b70401ca053cc146d9bd3cdae60a28e8451c552f3b880651bfd7cd3531cb2e491d4f9
-
SSDEEP
3072:qbvR5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Yn:qbv/S7BqjjYHdrqkL/
Behavioral task
behavioral1
Sample
PandoraClient.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
PandoraClient.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
arrowrat
Client
pandoravnc.duckdns.org:4046
QMcrubGGd
Targets
-
-
Target
PandoraClient.exe
-
Size
138KB
-
MD5
4649bb4b0cb232966683c589150ff119
-
SHA1
d2165c3988dc382fbf1bfec9828f323a9ac9282b
-
SHA256
41940020b7778a380f4d0907d4a95a8afe2108b3df3f7f73d7847d069ff29dcc
-
SHA512
72061b043678530ab19d6d3438c5cfe9e0d1b653899292191e11dc9bae1b70401ca053cc146d9bd3cdae60a28e8451c552f3b880651bfd7cd3531cb2e491d4f9
-
SSDEEP
3072:qbvR5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Yn:qbv/S7BqjjYHdrqkL/
Score10/10-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-