Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
129d13a1399065a46b8fc48b4f9252285ef592e4f96b15b2238b44cca1646f10.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
129d13a1399065a46b8fc48b4f9252285ef592e4f96b15b2238b44cca1646f10.exe
Resource
win10v2004-20220901-en
Target
129d13a1399065a46b8fc48b4f9252285ef592e4f96b15b2238b44cca1646f10.zip
Size
377KB
MD5
2a9c08f03c4d8400f8ef9fffec07ab24
SHA1
c3cbd1cae2a0a1732737c342e9e0f4a38fafa5b7
SHA256
2e9dc6ff8304991e933824b25ecd46082eafabe3d8a3f2e19f6608c147b20b49
SHA512
70f681569a4058a98870445121de23a007a199d5dc3866740979b632874c89442c432e78b16acc19737c84f454fc65c7e53b87f322a4aaa91b134403a9a67938
SSDEEP
6144:oxsiOJsotDzkmiQ229VBdWBfFyNJNsc6QRSQYtncGQvrQLCqL13kVuQsTNgxJP6A:otgRDj22NdW9FyH+c6QRPYtncNDQ+y3q
pandastealer
1.11
http://a0713805.xsph.ru
Processes:
resource | yara_rule |
---|---|
static1/unpack001/129d13a1399065a46b8fc48b4f9252285ef592e4f96b15b2238b44cca1646f10 | family_pandastealer |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
EnterCriticalSection
GetCurrentProcess
WriteFile
LeaveCriticalSection
SetFilePointer
InitializeCriticalSectionEx
UnmapViewOfFile
GetModuleHandleA
HeapSize
MultiByteToWideChar
GetFileInformationByHandle
CopyFileA
GetLastError
CreateFileA
FileTimeToSystemTime
LoadLibraryA
LockResource
HeapReAlloc
CloseHandle
RaiseException
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
GetLocalTime
DecodePointer
HeapDestroy
GetProcAddress
CreateFileMappingA
GetFileSize
DeleteCriticalSection
GetProcessHeap
SystemTimeToFileTime
FreeLibrary
HeapFree
MapViewOfFile
GetTickCount
IsWow64Process
AreFileApisANSI
GetFullPathNameW
LockFile
InitializeCriticalSection
GetFullPathNameA
SetEndOfFile
GetTempPathW
CreateFileW
GetFileAttributesW
GetCurrentThreadId
Sleep
GetTempPathA
GetFileAttributesA
GetVersionExA
DeleteFileA
DeleteFileW
LoadLibraryW
UnlockFile
LockFileEx
GetCurrentProcessId
GetSystemTimeAsFileTime
GetSystemTime
FormatMessageA
QueryPerformanceCounter
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
SizeofResource
GetModuleFileNameA
WideCharToMultiByte
ReadFile
ReadConsoleW
GetTimeZoneInformation
GetFileType
GetFileSizeEx
GetConsoleMode
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
WriteConsoleW
GetCommandLineW
GetCommandLineA
GetStdHandle
GetModuleFileNameW
QueryPerformanceFrequency
GetModuleHandleExW
ExitProcess
VirtualQuery
VirtualProtect
VirtualAlloc
GetSystemInfo
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
RemoveDirectoryW
SetFilePointerEx
SetLastError
GetModuleHandleW
CopyFileW
LocalFree
GetStringTypeW
EncodePointer
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
InitializeSListHead
TerminateProcess
RtlUnwind
LoadLibraryExW
GetDC
GetSystemMetrics
ReleaseDC
GetDesktopWindow
DeleteObject
GetObjectA
PathFindExtensionW
PathFindExtensionA
GdipSaveImageToFile
GdipCreateBitmapFromScan0
GdipGetImageEncodersSize
GdipDisposeImage
GdipGetImageEncoders
GdiplusShutdown
GdipCreateBitmapFromHBITMAP
GdiplusStartup
InternetWriteFile
HttpEndRequestA
HttpSendRequestExA
InternetOpenA
HttpOpenRequestA
InternetConnectA
InternetCloseHandle
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ