General

  • Target

    914410cb4eda2096fda7793bb477791d4d9359aa02ece5de7d0a36a4af11ddd6

  • Size

    1.1MB

  • Sample

    220511-c3z3hsdgd6

  • MD5

    f8e432d36ebd685d203d761081c8287f

  • SHA1

    d3c76ce501250cfbfd9c15bcf8d9d92645f6103f

  • SHA256

    914410cb4eda2096fda7793bb477791d4d9359aa02ece5de7d0a36a4af11ddd6

  • SHA512

    2350b8f7350c416b97cf13e8fcb99a83609dfaf02143e74ff3b9e851edb1d6ce55a6dc0f6b8ae43ee582fd6acc2d50641e79da7059c81b5953625dcf651c0220

Malware Config

Extracted

Family

pandastealer

Version

1.11

C2

http://u843854nsj.ha004.t.justns.ru

Targets

    • Target

      914410cb4eda2096fda7793bb477791d4d9359aa02ece5de7d0a36a4af11ddd6

    • Size

      1.1MB

    • MD5

      f8e432d36ebd685d203d761081c8287f

    • SHA1

      d3c76ce501250cfbfd9c15bcf8d9d92645f6103f

    • SHA256

      914410cb4eda2096fda7793bb477791d4d9359aa02ece5de7d0a36a4af11ddd6

    • SHA512

      2350b8f7350c416b97cf13e8fcb99a83609dfaf02143e74ff3b9e851edb1d6ce55a6dc0f6b8ae43ee582fd6acc2d50641e79da7059c81b5953625dcf651c0220

    • Panda Stealer Payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks