Analysis
-
max time kernel
4294179s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
19-03-2022 12:58
Static task
static1
Behavioral task
behavioral1
Sample
b59f27dedadd616a884740a63e360bd8484f75db0e6c90b199b5c15c5a10d85b.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
b59f27dedadd616a884740a63e360bd8484f75db0e6c90b199b5c15c5a10d85b.exe
Resource
win10v2004-en-20220113
General
-
Target
b59f27dedadd616a884740a63e360bd8484f75db0e6c90b199b5c15c5a10d85b.exe
-
Size
1.9MB
-
MD5
d75d016964ffb38a1786645747f81a12
-
SHA1
8b792fcb8d1c2960180b427c4fc7c2d2e2e2f000
-
SHA256
b59f27dedadd616a884740a63e360bd8484f75db0e6c90b199b5c15c5a10d85b
-
SHA512
ad755146867b79d1e75ea09a2ccb990b5f8f3b80303a4811b53632a7fbd0e55826c863406d1c49f324ec7ce58e0e855f24f7b202cb3e515077482ee526745653
Malware Config
Signatures
-
Panda Stealer Payload 1 IoCs
resource yara_rule behavioral1/memory/852-55-0x0000000000140000-0x0000000000491000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
resource yara_rule behavioral1/memory/852-55-0x0000000000140000-0x0000000000491000-memory.dmp vmprotect -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 852 b59f27dedadd616a884740a63e360bd8484f75db0e6c90b199b5c15c5a10d85b.exe