Analysis
-
max time kernel
61s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 09:47
Behavioral task
behavioral1
Sample
7c3a055a28e49d10815df4079f6576451356e013d12113c19e03f32c5923e3f8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7c3a055a28e49d10815df4079f6576451356e013d12113c19e03f32c5923e3f8.exe
Resource
win10v2004-20220901-en
General
-
Target
7c3a055a28e49d10815df4079f6576451356e013d12113c19e03f32c5923e3f8.exe
-
Size
5.7MB
-
MD5
10d95152032b35c3861c2f1b3fb701fc
-
SHA1
1f99925ed6de536af3ee86ebf0794b518f24ca2f
-
SHA256
7c3a055a28e49d10815df4079f6576451356e013d12113c19e03f32c5923e3f8
-
SHA512
2f234cce171ae6f6341e2740237553fe2b30f66bb7d5e7707159d437c0e129273ffa70317b74c7136f2864fb75f00f94f88854c423690d78fab3242159eece7a
-
SSDEEP
98304:k5uRVDojz+nDoihvKbKnLwsSZleNDP+oBlN05/te/3b/w/424y7Xbjn:kEXnDBhvuScsu87+oBl+JA3b/I1fjn
Malware Config
Extracted
pandastealer
1.11
http://jsimsyjnko.000webhostapp.com
Signatures
-
Panda Stealer payload 4 IoCs
resource yara_rule behavioral2/memory/1560-132-0x00000000002D0000-0x0000000000C75000-memory.dmp family_pandastealer behavioral2/memory/1560-135-0x00000000002D0000-0x0000000000C75000-memory.dmp family_pandastealer behavioral2/memory/1560-136-0x00000000002D0000-0x0000000000C75000-memory.dmp family_pandastealer behavioral2/memory/1560-137-0x00000000002D0000-0x0000000000C75000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
resource yara_rule behavioral2/memory/1560-132-0x00000000002D0000-0x0000000000C75000-memory.dmp vmprotect behavioral2/memory/1560-135-0x00000000002D0000-0x0000000000C75000-memory.dmp vmprotect behavioral2/memory/1560-136-0x00000000002D0000-0x0000000000C75000-memory.dmp vmprotect behavioral2/memory/1560-137-0x00000000002D0000-0x0000000000C75000-memory.dmp vmprotect -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1560 7c3a055a28e49d10815df4079f6576451356e013d12113c19e03f32c5923e3f8.exe 1560 7c3a055a28e49d10815df4079f6576451356e013d12113c19e03f32c5923e3f8.exe 1560 7c3a055a28e49d10815df4079f6576451356e013d12113c19e03f32c5923e3f8.exe 1560 7c3a055a28e49d10815df4079f6576451356e013d12113c19e03f32c5923e3f8.exe