General

  • Target

    e265876e7f41deaad3ee465d837b94ea7d3e214fa9e2bcfd7bbfe0431c0d5336

  • Size

    5.7MB

  • Sample

    230129-v55d5aha8t

  • MD5

    f047eefd6c8d86842e9bc69e66b59889

  • SHA1

    3ccec34545e50611de0d7dcc0a12a0caed02f282

  • SHA256

    e265876e7f41deaad3ee465d837b94ea7d3e214fa9e2bcfd7bbfe0431c0d5336

  • SHA512

    e13b01c3282e7aebf731098365bb6d9a7062ad68db039753684f7fdf2b2f6005afec72f912d02bf791c14256ff436fce504f7eb41db26e79fa0e52123c1c6367

  • SSDEEP

    98304:BiGHUsHH4/oSgSYrihBSGiIM9zo5kSg7cZho5H29rvYyVhSj5FefL40SJ:BZ3nawSY2hBSGiH9zo67AhTDYyX40SJ

Malware Config

Extracted

Family

pandastealer

Version

1.11

C2

http://aaaagay.tbg123123.beget.tech

Targets

    • Target

      e265876e7f41deaad3ee465d837b94ea7d3e214fa9e2bcfd7bbfe0431c0d5336

    • Size

      5.7MB

    • MD5

      f047eefd6c8d86842e9bc69e66b59889

    • SHA1

      3ccec34545e50611de0d7dcc0a12a0caed02f282

    • SHA256

      e265876e7f41deaad3ee465d837b94ea7d3e214fa9e2bcfd7bbfe0431c0d5336

    • SHA512

      e13b01c3282e7aebf731098365bb6d9a7062ad68db039753684f7fdf2b2f6005afec72f912d02bf791c14256ff436fce504f7eb41db26e79fa0e52123c1c6367

    • SSDEEP

      98304:BiGHUsHH4/oSgSYrihBSGiIM9zo5kSg7cZho5H29rvYyVhSj5FefL40SJ:BZ3nawSY2hBSGiH9zo67AhTDYyX40SJ

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks