C:\Users\Ilham\source\repos\Guna.UI2\Guna.UI2\bin\Release\Secured\Guna.UI2.pdb
Overview
overview
10Static
static
10Guna.UI2.dll
windows10-1703-x64
1Guna.UI2.dll
windows10-2004-x64
1Guna.UI2.dll
windows11-21h2-x64
1PandorahVNC.exe
windows10-1703-x64
7PandorahVNC.exe
windows10-2004-x64
7PandorahVNC.exe
windows11-21h2-x64
7client.exe
windows10-1703-x64
10client.exe
windows10-2004-x64
10client.exe
windows11-21h2-x64
10dnlib.dll
windows10-1703-x64
1dnlib.dll
windows10-2004-x64
1dnlib.dll
windows11-21h2-x64
1Behavioral task
behavioral1
Sample
Guna.UI2.dll
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Guna.UI2.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Guna.UI2.dll
Resource
win11-20240611-en
Behavioral task
behavioral4
Sample
PandorahVNC.exe
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
PandorahVNC.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
PandorahVNC.exe
Resource
win11-20240419-en
Behavioral task
behavioral7
Sample
client.exe
Resource
win10-20240611-en
Behavioral task
behavioral8
Sample
client.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
client.exe
Resource
win11-20240508-en
Behavioral task
behavioral10
Sample
dnlib.dll
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
dnlib.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
dnlib.dll
Resource
win11-20240508-en
General
-
Target
PANDORA HVNC Cracked.zip.zip
-
Size
4.1MB
-
MD5
0f8b506d7925457584afdd8a8d295d7c
-
SHA1
3d99cf175cd6de9962086ebbd890eded2e92df0c
-
SHA256
393c7e77b02c57fab99cc076e29bd439ca049cacdbd9f7511177aa3ffd8d9b01
-
SHA512
ad6c80562f6dc2f27a8508c1df5429c9a639b17834e35705863dc15b349d912f0cca83d1cd49f82b3377c2a4e43eedad199db0faf2f32dd659a91708818557d4
-
SSDEEP
98304:7mvy5sIojJCe5CfOjoxj887wYfHcL/ljN2qsWDdoEzjzENqZdwP:7mK5snCfOjg8a8LdQqzawjYqy
Malware Config
Extracted
arrowrat
identifier
IP:PORT
mutex
Signatures
-
Arrowrat family
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule static1/unpack002/Guna.UI2.dll agile_net -
Unsigned PE 4 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack002/Guna.UI2.dll unpack002/PandorahVNC.exe unpack002/client.bin unpack002/dnlib.dll
Files
-
PANDORA HVNC Cracked.zip.zip.zip
Password: infected
-
PANDORA HVNC Cracked.zip.zip
-
Guna.UI2.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
mscoree
_CorDllMain
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
PandorahVNC.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 126KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
client.bin.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
dnlib.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
D:\a\dnlib\dnlib\src\obj\Release\net45\dnlib.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ