Analysis
-
max time kernel
220s -
max time network
337s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 09:47
Behavioral task
behavioral1
Sample
7c3a055a28e49d10815df4079f6576451356e013d12113c19e03f32c5923e3f8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7c3a055a28e49d10815df4079f6576451356e013d12113c19e03f32c5923e3f8.exe
Resource
win10v2004-20220901-en
General
-
Target
7c3a055a28e49d10815df4079f6576451356e013d12113c19e03f32c5923e3f8.exe
-
Size
5.7MB
-
MD5
10d95152032b35c3861c2f1b3fb701fc
-
SHA1
1f99925ed6de536af3ee86ebf0794b518f24ca2f
-
SHA256
7c3a055a28e49d10815df4079f6576451356e013d12113c19e03f32c5923e3f8
-
SHA512
2f234cce171ae6f6341e2740237553fe2b30f66bb7d5e7707159d437c0e129273ffa70317b74c7136f2864fb75f00f94f88854c423690d78fab3242159eece7a
-
SSDEEP
98304:k5uRVDojz+nDoihvKbKnLwsSZleNDP+oBlN05/te/3b/w/424y7Xbjn:kEXnDBhvuScsu87+oBl+JA3b/I1fjn
Malware Config
Extracted
pandastealer
1.11
http://jsimsyjnko.000webhostapp.com
Signatures
-
Panda Stealer payload 4 IoCs
resource yara_rule behavioral1/memory/596-54-0x0000000000EB0000-0x0000000001855000-memory.dmp family_pandastealer behavioral1/memory/596-57-0x0000000000EB0000-0x0000000001855000-memory.dmp family_pandastealer behavioral1/memory/596-59-0x0000000000EB0000-0x0000000001855000-memory.dmp family_pandastealer behavioral1/memory/596-60-0x0000000000EB0000-0x0000000001855000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
resource yara_rule behavioral1/memory/596-54-0x0000000000EB0000-0x0000000001855000-memory.dmp vmprotect behavioral1/memory/596-57-0x0000000000EB0000-0x0000000001855000-memory.dmp vmprotect behavioral1/memory/596-59-0x0000000000EB0000-0x0000000001855000-memory.dmp vmprotect behavioral1/memory/596-60-0x0000000000EB0000-0x0000000001855000-memory.dmp vmprotect -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 596 7c3a055a28e49d10815df4079f6576451356e013d12113c19e03f32c5923e3f8.exe 596 7c3a055a28e49d10815df4079f6576451356e013d12113c19e03f32c5923e3f8.exe