General

  • Target

    3992d7d7e4cfe62a2bc7bada61f35bda7a1af7ecacb7e17aaaf4816a94857907

  • Size

    5.8MB

  • Sample

    230129-v56l7aff72

  • MD5

    46f70d5e7ae38ac852b3f4cabbc4260d

  • SHA1

    9e2069059d1f7cff461f5e5fc02d3a5ebca8b44c

  • SHA256

    3992d7d7e4cfe62a2bc7bada61f35bda7a1af7ecacb7e17aaaf4816a94857907

  • SHA512

    9333dd121128fcb0ec2399f4afb89e9febcfb8b07d91393a15efaf4f3020905b8fb55e4e718e5d5c93c66146a7786a5c3e1fc4bb5c7ee248b20ddb3f9778bebd

  • SSDEEP

    98304:e1nTr6CuVbNM8lcJHjfF0EIL1xpouxJjEvl+KTmeg8mn59EhZQCINZwbP2:cTWCuVJRlUHTFQbxJjEvpT+znAhZQCOK

Malware Config

Extracted

Family

pandastealer

Version

1.11

C2

http://gfgjhfgjfghgfghghg.ffox.site

Targets

    • Target

      3992d7d7e4cfe62a2bc7bada61f35bda7a1af7ecacb7e17aaaf4816a94857907

    • Size

      5.8MB

    • MD5

      46f70d5e7ae38ac852b3f4cabbc4260d

    • SHA1

      9e2069059d1f7cff461f5e5fc02d3a5ebca8b44c

    • SHA256

      3992d7d7e4cfe62a2bc7bada61f35bda7a1af7ecacb7e17aaaf4816a94857907

    • SHA512

      9333dd121128fcb0ec2399f4afb89e9febcfb8b07d91393a15efaf4f3020905b8fb55e4e718e5d5c93c66146a7786a5c3e1fc4bb5c7ee248b20ddb3f9778bebd

    • SSDEEP

      98304:e1nTr6CuVbNM8lcJHjfF0EIL1xpouxJjEvl+KTmeg8mn59EhZQCINZwbP2:cTWCuVJRlUHTFQbxJjEvpT+znAhZQCOK

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.