General

  • Target

    12fdab70f2ce661a0cd09c7862edb45aa9c974a564d1236dacf7ae81decd95af

  • Size

    1.1MB

  • Sample

    220213-l6afpsgff8

  • MD5

    51742a4508425c35b73662e12f6c1cb5

  • SHA1

    d65b66a7c59f070dc1a35b563b753f4eddfdd431

  • SHA256

    12fdab70f2ce661a0cd09c7862edb45aa9c974a564d1236dacf7ae81decd95af

  • SHA512

    1330f7e246eeb600bf60d972cd05c9a3f0a0558955d75958cff6f62b86c43c8a9386eed1fc5433c290f0c1db4b853d0403bd56f2451444f0a8e6311f6b6ba052

Score
10/10

Malware Config

Targets

    • Target

      12fdab70f2ce661a0cd09c7862edb45aa9c974a564d1236dacf7ae81decd95af

    • Size

      1.1MB

    • MD5

      51742a4508425c35b73662e12f6c1cb5

    • SHA1

      d65b66a7c59f070dc1a35b563b753f4eddfdd431

    • SHA256

      12fdab70f2ce661a0cd09c7862edb45aa9c974a564d1236dacf7ae81decd95af

    • SHA512

      1330f7e246eeb600bf60d972cd05c9a3f0a0558955d75958cff6f62b86c43c8a9386eed1fc5433c290f0c1db4b853d0403bd56f2451444f0a8e6311f6b6ba052

    Score
    10/10
    • Panda Stealer Payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks