Analysis
-
max time kernel
64s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
19-04-2022 02:35
Static task
static1
Behavioral task
behavioral1
Sample
27a9023efb80dcfb56b17dad33c6aa61535ed5a2f91ba7c8a15ffacaa7a00ad0.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
27a9023efb80dcfb56b17dad33c6aa61535ed5a2f91ba7c8a15ffacaa7a00ad0.exe
Resource
win10v2004-20220414-en
General
-
Target
27a9023efb80dcfb56b17dad33c6aa61535ed5a2f91ba7c8a15ffacaa7a00ad0.exe
-
Size
349KB
-
MD5
166fc80622122cee7b94d4c317f70ee8
-
SHA1
a25135887c345d1952b0634643cc78db00b0344d
-
SHA256
27a9023efb80dcfb56b17dad33c6aa61535ed5a2f91ba7c8a15ffacaa7a00ad0
-
SHA512
13beab7e458a6966edf127ea37170afd9570b7669243bf990193253eaf5d7c3b43ae6d94be0f1eedd0e9dea108db2da3ce4909a025993565ca9a93ef0351c3f1
Malware Config
Signatures
-
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 948 27a9023efb80dcfb56b17dad33c6aa61535ed5a2f91ba7c8a15ffacaa7a00ad0.exe