General

  • Target

    2949ae862f29a51027ade70cc02e483439f4c3aba6e42e6623daced3714d1b60

  • Size

    229KB

  • Sample

    230219-tnqnzafd41

  • MD5

    73fa447cb47faf3e975479de5cc60cd8

  • SHA1

    b2025bb55894a18d4bba9ecdad14f50109349f33

  • SHA256

    2949ae862f29a51027ade70cc02e483439f4c3aba6e42e6623daced3714d1b60

  • SHA512

    fcc346590d63cfb1afc39c2098d4fde29ece80a9f3dcf2d4c1c8dcdce84aac4714c1cbef25d14f27e418e3ae68c86c4b4858b23907b9006285f9045f2ef6fb50

  • SSDEEP

    3072:+n92UWxHILc1PuADtH20n41epgs13BxzXzqlK2Ylzb8QDeFVvQPtB7fVS:5xHILdADPn4wph13BNOG7DeFMj7f

Malware Config

Targets

    • Target

      2949ae862f29a51027ade70cc02e483439f4c3aba6e42e6623daced3714d1b60

    • Size

      229KB

    • MD5

      73fa447cb47faf3e975479de5cc60cd8

    • SHA1

      b2025bb55894a18d4bba9ecdad14f50109349f33

    • SHA256

      2949ae862f29a51027ade70cc02e483439f4c3aba6e42e6623daced3714d1b60

    • SHA512

      fcc346590d63cfb1afc39c2098d4fde29ece80a9f3dcf2d4c1c8dcdce84aac4714c1cbef25d14f27e418e3ae68c86c4b4858b23907b9006285f9045f2ef6fb50

    • SSDEEP

      3072:+n92UWxHILc1PuADtH20n41epgs13BxzXzqlK2Ylzb8QDeFVvQPtB7fVS:5xHILdADPn4wph13BNOG7DeFMj7f

    • Detects Smokeloader packer

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks