General

  • Target

    34aa8ab1fdfbb0507d22838b8f618704efef899694d494b00dcc1a315fa86789

  • Size

    5.0MB

  • Sample

    220502-1dcgxsebbk

  • MD5

    69ef826f3d9a3aca327e938327d91644

  • SHA1

    43e9c02b386564fb46425feaf5e7a29096c01f0d

  • SHA256

    34aa8ab1fdfbb0507d22838b8f618704efef899694d494b00dcc1a315fa86789

  • SHA512

    93457365d0ab55d3de9828d98f411dbe1c3435c25ecf16f92d0a6b9e9028ee4a1b896101d042eef486759b935abb99ea1f93607764e184adc84d0825e675013d

Malware Config

Targets

    • Target

      34aa8ab1fdfbb0507d22838b8f618704efef899694d494b00dcc1a315fa86789

    • Size

      5.0MB

    • MD5

      69ef826f3d9a3aca327e938327d91644

    • SHA1

      43e9c02b386564fb46425feaf5e7a29096c01f0d

    • SHA256

      34aa8ab1fdfbb0507d22838b8f618704efef899694d494b00dcc1a315fa86789

    • SHA512

      93457365d0ab55d3de9828d98f411dbe1c3435c25ecf16f92d0a6b9e9028ee4a1b896101d042eef486759b935abb99ea1f93607764e184adc84d0825e675013d

    • Panda Stealer Payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks