General

  • Target

    PANDORA HVNC Cracked.zip.zip

  • Size

    4.1MB

  • MD5

    0f8b506d7925457584afdd8a8d295d7c

  • SHA1

    3d99cf175cd6de9962086ebbd890eded2e92df0c

  • SHA256

    393c7e77b02c57fab99cc076e29bd439ca049cacdbd9f7511177aa3ffd8d9b01

  • SHA512

    ad6c80562f6dc2f27a8508c1df5429c9a639b17834e35705863dc15b349d912f0cca83d1cd49f82b3377c2a4e43eedad199db0faf2f32dd659a91708818557d4

  • SSDEEP

    98304:7mvy5sIojJCe5CfOjoxj887wYfHcL/ljN2qsWDdoEzjzENqZdwP:7mK5snCfOjg8a8LdQqzawjYqy

Malware Config

Extracted

Family

arrowrat

Botnet

identifier

C2

IP:PORT

Mutex

mutex

Signatures

  • Arrowrat family
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Unsigned PE 4 IoCs

    Checks for missing Authenticode signature.

Files

  • PANDORA HVNC Cracked.zip.zip
    .zip

    Password: infected

  • PANDORA HVNC Cracked.zip
    .zip
  • Guna.UI2.dll
    .dll windows:4 windows x86 arch:x86

    dae02f32a21e03ce65412f6e56942daa


    Headers

    Imports

    Sections

  • PandorahVNC.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • client.bin
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • dnlib.dll
    .dll windows:4 windows x86 arch:x86

    dae02f32a21e03ce65412f6e56942daa


    Headers

    Imports

    Sections