Analysis
-
max time kernel
159s -
max time network
138s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 21:10
Static task
static1
Behavioral task
behavioral1
Sample
ccddf18fa31637461c23e300a115fc8b8a93428b7fc61986f9939b2947108fb4.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ccddf18fa31637461c23e300a115fc8b8a93428b7fc61986f9939b2947108fb4.exe
Resource
win10-en-20211208
General
-
Target
ccddf18fa31637461c23e300a115fc8b8a93428b7fc61986f9939b2947108fb4.exe
-
Size
761KB
-
MD5
342fd8d31e38883dbdd044a100b45cee
-
SHA1
65c9027ee5913c66b3a01473d0c3b639e3a7eb4b
-
SHA256
ccddf18fa31637461c23e300a115fc8b8a93428b7fc61986f9939b2947108fb4
-
SHA512
2d9bcbdff4ffd01ca6afc7753671d70fffeef6c71abd77c27f9657e3e40e7fdce36c1e615f733f92be04491cd45b20777c07c1adfb5567ccf21da010f28b7548
Malware Config
Signatures
-
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3980 ccddf18fa31637461c23e300a115fc8b8a93428b7fc61986f9939b2947108fb4.exe 3980 ccddf18fa31637461c23e300a115fc8b8a93428b7fc61986f9939b2947108fb4.exe