General
-
Target
pandora.exe
-
Size
158KB
-
Sample
250111-nsbsqayke1
-
MD5
990b4366c8214281b19989fff2beebb7
-
SHA1
56814a2602db00e25bbb2c07aaf8ebffce00f6ef
-
SHA256
79cde129a3ca0865d953d1e1e664497100c5d185f14ba49e6aa261f6f0282132
-
SHA512
d6c461aec2e0becbaf76c8e6ebc9ed249c26c0a203af4445c5af999724dffa4653c4f3b6e4b597b99dd66943e7b36c8e9f613825183926556f456a26d22e6681
-
SSDEEP
3072:wbzoH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPodO8Y:wbzoe0ODhTEPgnjuIJzo+PPcfPoQ8
Behavioral task
behavioral1
Sample
pandora.exe
Resource
win7-20240903-en
Malware Config
Extracted
arrowrat
HVNC
vshostupdater.duckdns.org:34357
TnXRoYazW
Targets
-
-
Target
pandora.exe
-
Size
158KB
-
MD5
990b4366c8214281b19989fff2beebb7
-
SHA1
56814a2602db00e25bbb2c07aaf8ebffce00f6ef
-
SHA256
79cde129a3ca0865d953d1e1e664497100c5d185f14ba49e6aa261f6f0282132
-
SHA512
d6c461aec2e0becbaf76c8e6ebc9ed249c26c0a203af4445c5af999724dffa4653c4f3b6e4b597b99dd66943e7b36c8e9f613825183926556f456a26d22e6681
-
SSDEEP
3072:wbzoH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPodO8Y:wbzoe0ODhTEPgnjuIJzo+PPcfPoQ8
-
Arrowrat family
-
Modifies WinLogon for persistence
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Event Triggered Execution
1Component Object Model Hijacking
1