General

  • Target

    27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9

  • Size

    1.3MB

  • Sample

    220524-1x8pgaddhr

  • MD5

    518e2ebf1c5ac4f2cdfd5dd81fa60ec7

  • SHA1

    cfc5904e2457fdf92230391b025acd9b607f0232

  • SHA256

    27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9

  • SHA512

    c147c0145231b255a4336354ecd1797f1b44c6b2a6b0766aed769fb550eac1a5af5c06f1ec364c7c1b71cc986ac52222695a810726bc293ac7830e3172c10cdc

Malware Config

Extracted

Family

pandastealer

Version

1.10

C2

http://u808504gws.ha004.t.justns.ru

Targets

    • Target

      27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9

    • Size

      1.3MB

    • MD5

      518e2ebf1c5ac4f2cdfd5dd81fa60ec7

    • SHA1

      cfc5904e2457fdf92230391b025acd9b607f0232

    • SHA256

      27c4e6145a383919af1c54a10a279e07002a4e774006ccc0a7f8dd609c81d4b9

    • SHA512

      c147c0145231b255a4336354ecd1797f1b44c6b2a6b0766aed769fb550eac1a5af5c06f1ec364c7c1b71cc986ac52222695a810726bc293ac7830e3172c10cdc

    • Panda Stealer Payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks