Static task
static1
Behavioral task
behavioral1
Sample
97247e269e05e1e237515fb76795e1d0e17333ed5d88571f6dc37e2c66dc2d4b.exe
Resource
win7-en-20211208
General
-
Target
97247e269e05e1e237515fb76795e1d0e17333ed5d88571f6dc37e2c66dc2d4b
-
Size
655KB
-
MD5
47072f5ade427fe5c156fd19fa339610
-
SHA1
e10e4a87b94f52aad7dab3542fb1be7a2d631736
-
SHA256
97247e269e05e1e237515fb76795e1d0e17333ed5d88571f6dc37e2c66dc2d4b
-
SHA512
9e8065dd57bfa2b74ca360fe45cee020a249ad16704e4752b6542251d2b8a4b013b9d2f8a9e9ad6274c1c06888a9c45a178e0941a4a0862455547cc8aa0af21d
-
SSDEEP
12288:6gRA59DcBEH8yhb5BjxVKGXKVbN8RPsL6/83F8qOhb7Q5Xz9GrbiAqRbmDuLzEw:6gy59Dpbj1V7KVbmRPsL6/83F8qOJs9
Malware Config
Signatures
-
Panda Stealer Payload 1 IoCs
resource yara_rule sample family_pandastealer -
Pandastealer family
Files
-
97247e269e05e1e237515fb76795e1d0e17333ed5d88571f6dc37e2c66dc2d4b.exe windows x86
01aa6b73dab6ff4eaf764d87cc60ccfd
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
WriteFile
LeaveCriticalSection
SetFilePointer
InitializeCriticalSectionEx
CreateMutexA
UnmapViewOfFile
HeapSize
MultiByteToWideChar
Sleep
GetFileInformationByHandle
GetLastError
CreateFileA
FileTimeToSystemTime
LoadLibraryA
LockResource
HeapReAlloc
CloseHandle
RaiseException
GetSystemInfo
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
GetLocalTime
DecodePointer
HeapDestroy
GetProcAddress
CreateFileMappingA
GetFileSize
DeleteCriticalSection
GetProcessHeap
SystemTimeToFileTime
FreeLibrary
WideCharToMultiByte
EnterCriticalSection
GetTickCount
IsWow64Process
AreFileApisANSI
GetFullPathNameW
LockFile
InitializeCriticalSection
GetFullPathNameA
SetEndOfFile
GetTempPathW
CreateFileW
GetFileAttributesW
GetCurrentThreadId
GetTempPathA
GetFileAttributesA
GetVersionExA
DeleteFileA
DeleteFileW
LoadLibraryW
UnlockFile
LockFileEx
GetCurrentProcessId
GetSystemTimeAsFileTime
GetSystemTime
FormatMessageA
QueryPerformanceCounter
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
ReadConsoleW
HeapFree
SizeofResource
MapViewOfFile
ReadFile
GetTimeZoneInformation
GetFileType
GetFileSizeEx
GetConsoleMode
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetCommandLineW
GetCommandLineA
WriteConsoleW
GetStdHandle
GetModuleFileNameW
QueryPerformanceFrequency
GetModuleHandleExW
ExitProcess
VirtualQuery
VirtualProtect
VirtualAlloc
LoadLibraryExW
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
RemoveDirectoryW
SetFilePointerEx
SetLastError
GetModuleHandleW
CopyFileW
FormatMessageW
GetStringTypeW
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
InitializeSListHead
TerminateProcess
RtlUnwind
user32
GetDC
GetDesktopWindow
FindWindowA
ShowWindow
GetSystemMetrics
ReleaseDC
gdi32
DeleteObject
GetObjectA
shlwapi
PathFindExtensionW
PathFindExtensionA
gdiplus
GdipSaveImageToFile
GdipCreateBitmapFromScan0
GdipGetImageEncodersSize
GdipCreateBitmapFromHBITMAP
GdipGetImageEncoders
GdiplusShutdown
GdipDisposeImage
GdiplusStartup
wininet
HttpSendRequestExA
InternetWriteFile
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
HttpEndRequestA
InternetConnectA
InternetReadFile
Sections
.text Size: 519KB - Virtual size: 518KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ