Quick revs: Pandora Ransomware - The Box has been open for a while...
Common Information
Type Value
UUID 144e5ff6-ae4f-4250-9b82-24e04f75123a
Fingerprint 3c0798b21d958293
Analysis status DONE
Considered CTI value 2
Text language
Published March 16, 2022, midnight
Added to db Sept. 11, 2022, 12:33 p.m.
Last updated Nov. 17, 2024, 5:58 p.m.
Headline UNKNOWN
Title Quick revs: Pandora Ransomware - The Box has been open for a while...
Detected Hints/Tags/Attributes 39/1/26
Attributes
Details Type #Events CTI Value
Details Domain 4
dissectingmalwa.re
Details Email 2
hello@dissectingmalwa.re
Details File 1
1vfrk1jrt.dll
Details File 1
m3do2.exe
Details File 1
7nm2j.txt
Details File 229
advapi32.dll
Details File 748
kernel32.dll
Details File 45
mpr.dll
Details File 185
shell32.dll
Details File 69
shlwapi.dll
Details File 291
user32.dll
Details md5 4
0c4a84b66832a08dccc42b478d9d5e1b
Details md5 1
511501033ca23754113686ac70f629db
Details md5 2
bec9b3480934ce3d30c25e1272f60d02
Details md5 1
afdf739eb186e2ec8088b008797d1f6d
Details md5 1
51a8b4c9f41b0c0ca57db63e21505b0d
Details sha1 3
160320b920a5ef22ac17b48146152ffbef60461f
Details sha1 1
26a02a149aca6a8a43e2dca5c75a6360cfe54c50
Details sha1 2
104d9e31e34ba8517f701552594f1fc167550964
Details sha1 1
f611c2976ebb080214eddd905d30628230f2280d
Details sha256 2
5b56c5d86347e164c6e571c86dbf5b1535eae6b979fede6ed66b01e79ea33b7b
Details sha256 1
2c940a35025dd3847f7c954a282f65e9c2312d2ada28686f9d1dc73d1c500224
Details sha256 2
f87be226e26e873275bde549539f70210ffe5e3a129448ae807a319cbdcf7789
Details sha256 1
ebfdee6e5fe2aa5699280248a5e7b714ca18e5bfd284cac0ba4fb88ccbcec5b6
Details Url 1
https://dissectingmalwa.re/blog/pandora
Details Yara rule 1
import "pe"

rule upx_packer_modified_pandora : Packer {
	meta:
		author = "Marius 'f0wL' Genheimer <hello@dissectingmalwa.re>"
		description = "Detects modified UPX packer used by Pandora Ransomware"
		reference = "https://dissectingmalwa.re/blog/pandora/"
		date = "2022-03-16"
		tlp = "WHITE"
		hash = "5b56c5d86347e164c6e571c86dbf5b1535eae6b979fede6ed66b01e79ea33b7b"
	strings:
		$header = { 33 2E 30 30 00 55 50 58 21 }
	condition:
		uint16(0) == 0x5a4d and pe.imphash() == "51a8b4c9f41b0c0ca57db63e21505b0d" and $header and for any i in (0 .. pe.number_of_sections) : ( pe.sections[i].name == "pppp" and pe.sections[i + 1].name == "cccc" ) and filesize > 112KB and filesize < 1MB
}