General

  • Target

    113d72ee9b8799d507cde23c44fa2b97e31dbbb141f2c8d6b0bdd157da628c66

  • Size

    1.2MB

  • Sample

    220330-cmb1raafcq

  • MD5

    9b2734137accced6a1c34e28ffe9e907

  • SHA1

    11de47bc139e4232eb6933075a457e2782fbecd8

  • SHA256

    113d72ee9b8799d507cde23c44fa2b97e31dbbb141f2c8d6b0bdd157da628c66

  • SHA512

    eb52ceb42180215d85c2ddaf72a60ab1346c267b0ef9ca25fbc1ad15d766f6097cec432a84f06555b7dfc11a7c6dcec3aac75cad5d15e117c8e37eeda6215e9d

Malware Config

Targets

    • Target

      113d72ee9b8799d507cde23c44fa2b97e31dbbb141f2c8d6b0bdd157da628c66

    • Size

      1.2MB

    • MD5

      9b2734137accced6a1c34e28ffe9e907

    • SHA1

      11de47bc139e4232eb6933075a457e2782fbecd8

    • SHA256

      113d72ee9b8799d507cde23c44fa2b97e31dbbb141f2c8d6b0bdd157da628c66

    • SHA512

      eb52ceb42180215d85c2ddaf72a60ab1346c267b0ef9ca25fbc1ad15d766f6097cec432a84f06555b7dfc11a7c6dcec3aac75cad5d15e117c8e37eeda6215e9d

    • Panda Stealer Payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks