General
-
Target
PandorahVNC 1.8.6 Fixed.rar
-
Size
26.2MB
-
Sample
250304-1yc9yssshx
-
MD5
93e38c285d4703b75890c99dd30f72cb
-
SHA1
77e353c82b805d1d55fdb16a4c559e876ff9d3e6
-
SHA256
04a15dcd45994e3181c002ecb3a5b6cb203b5dc05d634fe4cb015f76a4a006fd
-
SHA512
8253b0147cad4a3f7722d51294c99b1cc5391abb6a183e406d53eccc17099a5a5dadd4efe9bc6df452d5d463001416090f96950d578d64614de93ec871899ff2
-
SSDEEP
786432:5I8Am1JqFB9q+8wxzMZLRZ3MojlU7azLlCNRu0qvYyCifjoPq7:zd0ZUZc6U7azLAKbYyC0MPq7
Behavioral task
behavioral1
Sample
PandorahVNC 1.8.6 Fixed.rar
Resource
win11-20250217-en
Malware Config
Extracted
arrowrat
Client
80.76.49.15:1112
127.0.0.1:1337
System
Extracted
arrowrat
#GroupName#
#IP#:#PORT#
#Mutex#
Extracted
https://raw.githubusercontent.com/PandorahVNC/PhotoCollection/main/rescale.ps1
Targets
-
-
Target
PandorahVNC 1.8.6 Fixed.rar
-
Size
26.2MB
-
MD5
93e38c285d4703b75890c99dd30f72cb
-
SHA1
77e353c82b805d1d55fdb16a4c559e876ff9d3e6
-
SHA256
04a15dcd45994e3181c002ecb3a5b6cb203b5dc05d634fe4cb015f76a4a006fd
-
SHA512
8253b0147cad4a3f7722d51294c99b1cc5391abb6a183e406d53eccc17099a5a5dadd4efe9bc6df452d5d463001416090f96950d578d64614de93ec871899ff2
-
SSDEEP
786432:5I8Am1JqFB9q+8wxzMZLRZ3MojlU7azLlCNRu0qvYyCifjoPq7:zd0ZUZc6U7azLAKbYyC0MPq7
-
Arrowrat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-