Analysis
-
max time kernel
92s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-07-2022 07:05
Static task
static1
Behavioral task
behavioral1
Sample
91dc7643ba06a71cc09f92a54b130ee371339c4d7183f657828e32dbb7e1d8af.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
91dc7643ba06a71cc09f92a54b130ee371339c4d7183f657828e32dbb7e1d8af.exe
Resource
win10v2004-20220414-en
General
-
Target
91dc7643ba06a71cc09f92a54b130ee371339c4d7183f657828e32dbb7e1d8af.exe
-
Size
682KB
-
MD5
0a035262a096ce7282fc04debcdadd87
-
SHA1
d256b0572a44934243096ceb51cca44f3a3d304d
-
SHA256
91dc7643ba06a71cc09f92a54b130ee371339c4d7183f657828e32dbb7e1d8af
-
SHA512
b81d696f769cbd4b8a061623c72dfac21a2be16aa39223d48147bc4d60dedd6f512aba77b45c6baf0e549f6af4eb28c37a5a1c7bf15babd47750c704751ed288
Malware Config
Signatures
-
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3844 91dc7643ba06a71cc09f92a54b130ee371339c4d7183f657828e32dbb7e1d8af.exe 3844 91dc7643ba06a71cc09f92a54b130ee371339c4d7183f657828e32dbb7e1d8af.exe