General

  • Target

    3992d7d7e4cfe62a2bc7bada61f35bda7a1af7ecacb7e17aaaf4816a94857907

  • Size

    5.8MB

  • Sample

    230129-v56l7aff72

  • MD5

    46f70d5e7ae38ac852b3f4cabbc4260d

  • SHA1

    9e2069059d1f7cff461f5e5fc02d3a5ebca8b44c

  • SHA256

    3992d7d7e4cfe62a2bc7bada61f35bda7a1af7ecacb7e17aaaf4816a94857907

  • SHA512

    9333dd121128fcb0ec2399f4afb89e9febcfb8b07d91393a15efaf4f3020905b8fb55e4e718e5d5c93c66146a7786a5c3e1fc4bb5c7ee248b20ddb3f9778bebd

  • SSDEEP

    98304:e1nTr6CuVbNM8lcJHjfF0EIL1xpouxJjEvl+KTmeg8mn59EhZQCINZwbP2:cTWCuVJRlUHTFQbxJjEvpT+znAhZQCOK

Malware Config

Extracted

Family

pandastealer

Version

1.11

C2

http://gfgjhfgjfghgfghghg.ffox.site

Targets

    • Target

      3992d7d7e4cfe62a2bc7bada61f35bda7a1af7ecacb7e17aaaf4816a94857907

    • Size

      5.8MB

    • MD5

      46f70d5e7ae38ac852b3f4cabbc4260d

    • SHA1

      9e2069059d1f7cff461f5e5fc02d3a5ebca8b44c

    • SHA256

      3992d7d7e4cfe62a2bc7bada61f35bda7a1af7ecacb7e17aaaf4816a94857907

    • SHA512

      9333dd121128fcb0ec2399f4afb89e9febcfb8b07d91393a15efaf4f3020905b8fb55e4e718e5d5c93c66146a7786a5c3e1fc4bb5c7ee248b20ddb3f9778bebd

    • SSDEEP

      98304:e1nTr6CuVbNM8lcJHjfF0EIL1xpouxJjEvl+KTmeg8mn59EhZQCINZwbP2:cTWCuVJRlUHTFQbxJjEvpT+znAhZQCOK

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks