General

  • Target

    pandora.exe

  • Size

    158KB

  • Sample

    250111-nsbsqayke1

  • MD5

    990b4366c8214281b19989fff2beebb7

  • SHA1

    56814a2602db00e25bbb2c07aaf8ebffce00f6ef

  • SHA256

    79cde129a3ca0865d953d1e1e664497100c5d185f14ba49e6aa261f6f0282132

  • SHA512

    d6c461aec2e0becbaf76c8e6ebc9ed249c26c0a203af4445c5af999724dffa4653c4f3b6e4b597b99dd66943e7b36c8e9f613825183926556f456a26d22e6681

  • SSDEEP

    3072:wbzoH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPodO8Y:wbzoe0ODhTEPgnjuIJzo+PPcfPoQ8

Malware Config

Extracted

Family

arrowrat

Botnet

HVNC

C2

vshostupdater.duckdns.org:34357

Mutex

TnXRoYazW

Targets

    • Target

      pandora.exe

    • Size

      158KB

    • MD5

      990b4366c8214281b19989fff2beebb7

    • SHA1

      56814a2602db00e25bbb2c07aaf8ebffce00f6ef

    • SHA256

      79cde129a3ca0865d953d1e1e664497100c5d185f14ba49e6aa261f6f0282132

    • SHA512

      d6c461aec2e0becbaf76c8e6ebc9ed249c26c0a203af4445c5af999724dffa4653c4f3b6e4b597b99dd66943e7b36c8e9f613825183926556f456a26d22e6681

    • SSDEEP

      3072:wbzoH+0OoCthfbEFtbcfjF45gjryKKqH6JY2doszEmQotEPPcfPodO8Y:wbzoe0ODhTEPgnjuIJzo+PPcfPoQ8

    • ArrowRat

      Remote access tool with various capabilities first seen in late 2021.

    • Arrowrat family

    • Modifies WinLogon for persistence

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks