Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2023, 15:19 UTC
Behavioral task
behavioral1
Sample
50c1e8df73c95943551d862ac8e58ff6a064a3b17cbc841d97589cb1a2e51376.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
50c1e8df73c95943551d862ac8e58ff6a064a3b17cbc841d97589cb1a2e51376.exe
Resource
win10v2004-20220812-en
General
-
Target
50c1e8df73c95943551d862ac8e58ff6a064a3b17cbc841d97589cb1a2e51376.exe
-
Size
5.7MB
-
MD5
b318c432e7e6baab2d606df72aed7eff
-
SHA1
4fa94dc9e67d7d27097b4f1699a65767f728eb8d
-
SHA256
50c1e8df73c95943551d862ac8e58ff6a064a3b17cbc841d97589cb1a2e51376
-
SHA512
190fad1ac03fff9b5e3270c1442900b43bc2a95ddc34b3969bf82dbb2f63f0f1eced2126d0f3947128fb504154982f48acf2c16e09312c5a3bc6b2cc16f6e5b0
-
SSDEEP
98304:gi3r5p6X9ns1Os7qxPniZb7Ieiqs9DCRKOypL7SxMeSiyDM/qW:h3ruy/W5niuei/9DCRKOOuxMx+q
Malware Config
Signatures
-
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
resource yara_rule behavioral2/memory/1224-132-0x0000000000EA0000-0x0000000001847000-memory.dmp vmprotect behavioral2/memory/1224-135-0x0000000000EA0000-0x0000000001847000-memory.dmp vmprotect behavioral2/memory/1224-136-0x0000000000EA0000-0x0000000001847000-memory.dmp vmprotect behavioral2/memory/1224-137-0x0000000000EA0000-0x0000000001847000-memory.dmp vmprotect -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1224 50c1e8df73c95943551d862ac8e58ff6a064a3b17cbc841d97589cb1a2e51376.exe 1224 50c1e8df73c95943551d862ac8e58ff6a064a3b17cbc841d97589cb1a2e51376.exe
Processes
Network
-
Remote address:8.8.8.8:53Requestcollector-node.usIN AResponse
-
Remote address:8.8.8.8:53Requestcollector-node.usIN AResponse
-
Remote address:8.8.8.8:53Requestcollector-steal.gaIN AResponse
-
Remote address:8.8.8.8:53Request96.108.152.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request106.89.54.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.e.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.4.0.c.0.0.3.0.1.3.0.6.2.ip6.arpaIN PTRResponse
-
260 B 5
-
322 B 7
-
322 B 7
-
46 B 40 B 1 1
-
40 B 1
-
322 B 7
-
322 B 7
-
322 B 7
-
260 B 5
-
260 B 5
-
156 B 3
-
8.8.8.8:53collector-node.usdns50c1e8df73c95943551d862ac8e58ff6a064a3b17cbc841d97589cb1a2e51376.exe126 B 252 B 2 2
DNS Request
collector-node.us
DNS Request
collector-node.us
-
8.8.8.8:53collector-steal.gadns50c1e8df73c95943551d862ac8e58ff6a064a3b17cbc841d97589cb1a2e51376.exe64 B 122 B 1 1
DNS Request
collector-steal.ga
-
72 B 146 B 1 1
DNS Request
96.108.152.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
106.89.54.20.in-addr.arpa
-
118 B 204 B 1 1
DNS Request
0.e.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.4.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa