Analysis
-
max time kernel
92s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-06-2022 07:57
Static task
static1
Behavioral task
behavioral1
Sample
btwGaban.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
btwGaban.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
btwGaban.exe
-
Size
681KB
-
MD5
79a7debc04b66da7592ef55b768e46b4
-
SHA1
c71876635a7dbda629302a388fd36a0ee7c4ebd5
-
SHA256
7b8253ce462a3a1f6efcb7a7d27b8320751e90db7afd4846545d8e823bb8953e
-
SHA512
49cb6f1ab6ca897d346a35c7d6ef4b17b3c2afbbc974cff64f216bf6baa6cb89d529afc88f745699eaf244e24a143a580edc28c5baf0c3fa285d62a197f10e5b
Score
10/10
Malware Config
Signatures
-
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
suricata: ET MALWARE Win32/CollectorStealer CnC Exfil M3
suricata: ET MALWARE Win32/CollectorStealer CnC Exfil M3
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1564 btwGaban.exe 1564 btwGaban.exe