General

  • Target

    2665361cf05b16f5e4a06e0854b242bf8af84443a9a58fdf20781a56a0be4aea

  • Size

    190KB

  • Sample

    230215-weqnqadb52

  • MD5

    0f4366fc1e39b87214e8a8a8cf306410

  • SHA1

    0762fb2cda9320ccfefadc7ad269c4a65d24d8e5

  • SHA256

    2665361cf05b16f5e4a06e0854b242bf8af84443a9a58fdf20781a56a0be4aea

  • SHA512

    60e0c53acaa754458e29f35c492e728b4fdb464d9d522ea05acb07c69f728991ba7486019829417c0bef90fee3eb7f5b5686c5cd1a14f480a029287fc425e8d7

  • SSDEEP

    3072:AmNzQBbee3rl9gEI3SF8xyiuVusp77d/lpBL3dHW8GW:AgzQ8e3roEIiFCvvg77Ld28

Malware Config

Targets

    • Target

      2665361cf05b16f5e4a06e0854b242bf8af84443a9a58fdf20781a56a0be4aea

    • Size

      190KB

    • MD5

      0f4366fc1e39b87214e8a8a8cf306410

    • SHA1

      0762fb2cda9320ccfefadc7ad269c4a65d24d8e5

    • SHA256

      2665361cf05b16f5e4a06e0854b242bf8af84443a9a58fdf20781a56a0be4aea

    • SHA512

      60e0c53acaa754458e29f35c492e728b4fdb464d9d522ea05acb07c69f728991ba7486019829417c0bef90fee3eb7f5b5686c5cd1a14f480a029287fc425e8d7

    • SSDEEP

      3072:AmNzQBbee3rl9gEI3SF8xyiuVusp77d/lpBL3dHW8GW:AgzQ8e3roEIiFCvvg77Ld28

    • Detects Smokeloader packer

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks