Static task
static1
Behavioral task
behavioral1
Sample
a908fec53fa4a3e9a1c233454b9c1e18a971ac879620933e99d56adc9b1e75db.exe
Resource
win7-20220414-en
General
-
Target
a908fec53fa4a3e9a1c233454b9c1e18a971ac879620933e99d56adc9b1e75db
-
Size
655KB
-
MD5
6204680e5d212e22d3c0b36f293d62ec
-
SHA1
580d315e8d3b8da96363ea086b2f3e18c06500ac
-
SHA256
a908fec53fa4a3e9a1c233454b9c1e18a971ac879620933e99d56adc9b1e75db
-
SHA512
ff37b100a569c3b85953536f7633ba72aaf6ad9dc607ccddd04302e4aa4b22b71a2e744173d737bdc654fda086a47bb83ae1e8844713217934c898b1c812a12e
-
SSDEEP
12288:6gRA59DEBaH8yhb5BjxVKGXKVbN8RPsL6/83F8qOhb7Q5Xz9GrbiAqRbmDuLzEwc:6gy59DLbj1V7KVbmRPsL6/83F8qOJs9g
Malware Config
Signatures
-
Panda Stealer Payload 1 IoCs
resource yara_rule sample family_pandastealer -
Pandastealer family
Files
-
a908fec53fa4a3e9a1c233454b9c1e18a971ac879620933e99d56adc9b1e75db.exe windows x86
01aa6b73dab6ff4eaf764d87cc60ccfd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
WriteFile
LeaveCriticalSection
SetFilePointer
InitializeCriticalSectionEx
CreateMutexA
UnmapViewOfFile
HeapSize
MultiByteToWideChar
Sleep
GetFileInformationByHandle
GetLastError
CreateFileA
FileTimeToSystemTime
LoadLibraryA
LockResource
HeapReAlloc
CloseHandle
RaiseException
GetSystemInfo
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
GetLocalTime
DecodePointer
HeapDestroy
GetProcAddress
CreateFileMappingA
GetFileSize
DeleteCriticalSection
GetProcessHeap
SystemTimeToFileTime
FreeLibrary
WideCharToMultiByte
EnterCriticalSection
GetTickCount
IsWow64Process
AreFileApisANSI
GetFullPathNameW
LockFile
InitializeCriticalSection
GetFullPathNameA
SetEndOfFile
GetTempPathW
CreateFileW
GetFileAttributesW
GetCurrentThreadId
GetTempPathA
GetFileAttributesA
GetVersionExA
DeleteFileA
DeleteFileW
LoadLibraryW
UnlockFile
LockFileEx
GetCurrentProcessId
GetSystemTimeAsFileTime
GetSystemTime
FormatMessageA
QueryPerformanceCounter
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
ReadConsoleW
HeapFree
SizeofResource
MapViewOfFile
ReadFile
GetTimeZoneInformation
GetFileType
GetFileSizeEx
GetConsoleMode
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetCommandLineW
GetCommandLineA
WriteConsoleW
GetStdHandle
GetModuleFileNameW
QueryPerformanceFrequency
GetModuleHandleExW
ExitProcess
VirtualQuery
VirtualProtect
VirtualAlloc
LoadLibraryExW
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
RemoveDirectoryW
SetFilePointerEx
SetLastError
GetModuleHandleW
CopyFileW
FormatMessageW
GetStringTypeW
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
InitializeSListHead
TerminateProcess
RtlUnwind
user32
GetDC
GetDesktopWindow
FindWindowA
ShowWindow
GetSystemMetrics
ReleaseDC
gdi32
DeleteObject
GetObjectA
shlwapi
PathFindExtensionW
PathFindExtensionA
gdiplus
GdipSaveImageToFile
GdipCreateBitmapFromScan0
GdipGetImageEncodersSize
GdipCreateBitmapFromHBITMAP
GdipGetImageEncoders
GdiplusShutdown
GdipDisposeImage
GdiplusStartup
wininet
HttpSendRequestExA
InternetWriteFile
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
HttpEndRequestA
InternetConnectA
InternetReadFile
Sections
.text Size: 519KB - Virtual size: 518KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ