General

  • Target

    d4308d3282c98dc1f298484756d43ab8962f7e6c43eccd9c4ee29a253f5dba27

  • Size

    823KB

  • Sample

    220314-ec5lesefhn

  • MD5

    1f66154d69a4032a509979beb79f7e00

  • SHA1

    d89ad9add9987ae28f2141a3f4bbe3b323a0f4d9

  • SHA256

    d4308d3282c98dc1f298484756d43ab8962f7e6c43eccd9c4ee29a253f5dba27

  • SHA512

    aa74a86a6b96e254b3ad17d935af65fac8136d2809e9e5907fd50f2609a04da54cf6e60c4fa26823e8e60f3b2ea01c29853d0bde8f291e8d38b73a893c0b3520

Malware Config

Targets

    • Target

      d4308d3282c98dc1f298484756d43ab8962f7e6c43eccd9c4ee29a253f5dba27

    • Size

      823KB

    • MD5

      1f66154d69a4032a509979beb79f7e00

    • SHA1

      d89ad9add9987ae28f2141a3f4bbe3b323a0f4d9

    • SHA256

      d4308d3282c98dc1f298484756d43ab8962f7e6c43eccd9c4ee29a253f5dba27

    • SHA512

      aa74a86a6b96e254b3ad17d935af65fac8136d2809e9e5907fd50f2609a04da54cf6e60c4fa26823e8e60f3b2ea01c29853d0bde8f291e8d38b73a893c0b3520

    • Panda Stealer Payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks