General

  • Target

    9a0fae68664249ca1014ebb4fbcd515dc70a82cc2ccfab3c6671c5ab9168815d

  • Size

    899KB

  • Sample

    220326-j8fz6aadf4

  • MD5

    9a2d07cf1b75929a35b3f66f4c3838bf

  • SHA1

    3e2bbb2a0a4ece23c4e4010a9c463aed08f6e4be

  • SHA256

    9a0fae68664249ca1014ebb4fbcd515dc70a82cc2ccfab3c6671c5ab9168815d

  • SHA512

    89e573759266316dfd5976a1a1c7788e71fc89427f4dcce14f9ff845ad2c9c577471ad1f9adac87765f60cf1891f002c1d0fe9478176a4287145703ee1cc8554

Score
10/10

Malware Config

Targets

    • Target

      9a0fae68664249ca1014ebb4fbcd515dc70a82cc2ccfab3c6671c5ab9168815d

    • Size

      899KB

    • MD5

      9a2d07cf1b75929a35b3f66f4c3838bf

    • SHA1

      3e2bbb2a0a4ece23c4e4010a9c463aed08f6e4be

    • SHA256

      9a0fae68664249ca1014ebb4fbcd515dc70a82cc2ccfab3c6671c5ab9168815d

    • SHA512

      89e573759266316dfd5976a1a1c7788e71fc89427f4dcce14f9ff845ad2c9c577471ad1f9adac87765f60cf1891f002c1d0fe9478176a4287145703ee1cc8554

    Score
    10/10
    • Panda Stealer Payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks