Static task
static1
Behavioral task
behavioral1
Sample
d808216221746c98ebc2afa74ce7f48af1600ae52a22dc3e7468f5bf69d5dc76.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
d808216221746c98ebc2afa74ce7f48af1600ae52a22dc3e7468f5bf69d5dc76.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
6284088680022016.zip
-
Size
388KB
-
MD5
04fcde6edcaa33053b59ca95b3cef934
-
SHA1
a90c3a7496c57c10661a42ce0e02c6e5f3dbb605
-
SHA256
98149aeba69cfa7d1d21e798a26f91d8d284bdd12edf61cb7fb6503ac15849ea
-
SHA512
6e092bcad16ee56b9c913aef8b5f5e5f56e04f0ee2264e0f2739135efb5101934511aabc0f57e7dc2c9765f92a9e2a2ed0827f2a6390605a61967ba6b50a2f51
Score
10/10
Malware Config
Signatures
-
Panda Stealer Payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/d808216221746c98ebc2afa74ce7f48af1600ae52a22dc3e7468f5bf69d5dc76 family_pandastealer -
Pandastealer family
Files
-
6284088680022016.zip.zip
Password: infected
-
d808216221746c98ebc2afa74ce7f48af1600ae52a22dc3e7468f5bf69d5dc76.exe windows x86