General

  • Target

    26ebf4b16a7b59e42a4bb77818d6fd31.exe

  • Size

    196KB

  • Sample

    230220-tfm8wabe92

  • MD5

    26ebf4b16a7b59e42a4bb77818d6fd31

  • SHA1

    3b76faa23a88fa0937eab421e4c8f2c4a8d070f0

  • SHA256

    b06b1b4d5a9dddb0d067a38fdf2b3b872d974ce1379c4101ab13aa1a6f143b13

  • SHA512

    14675781ec3b69d01aafc6fa18d3184b29b3b8c68f90b002f2fe7bfe39f5fdb4fdae7a1fe87c12d10f53c166ea077cb533e997c8d069b67ecb966eda1c97df6a

  • SSDEEP

    3072:dpnVxDLhdvd+kfHkJbWU5TszWKsQ0U99qpz0kDB1sh02qR9wBA:3nVxDLl+Dpf5TYWKsQzbqKkzshALu

Malware Config

Targets

    • Target

      26ebf4b16a7b59e42a4bb77818d6fd31.exe

    • Size

      196KB

    • MD5

      26ebf4b16a7b59e42a4bb77818d6fd31

    • SHA1

      3b76faa23a88fa0937eab421e4c8f2c4a8d070f0

    • SHA256

      b06b1b4d5a9dddb0d067a38fdf2b3b872d974ce1379c4101ab13aa1a6f143b13

    • SHA512

      14675781ec3b69d01aafc6fa18d3184b29b3b8c68f90b002f2fe7bfe39f5fdb4fdae7a1fe87c12d10f53c166ea077cb533e997c8d069b67ecb966eda1c97df6a

    • SSDEEP

      3072:dpnVxDLhdvd+kfHkJbWU5TszWKsQ0U99qpz0kDB1sh02qR9wBA:3nVxDLl+Dpf5TYWKsQzbqKkzshALu

    • Detects Smokeloader packer

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks