General
-
Target
testpanderequests.exe.bin
-
Size
186KB
-
Sample
230505-zs9wasee68
-
MD5
7e7e25597f56f24d262e989abbb31222
-
SHA1
f3342f1c948a2ef8775d72389cfb76adc7c7ed21
-
SHA256
99c5747e5ada4de53bbed50ae5670f04ef4584632c873a060f54f42c70fbcf8c
-
SHA512
0872e14e4ec016ba0489b9ef26f3295173dc5ab37d92f93d2074e2ea518503945dcdaa6e4990942ee9c80bf1dc56d654c77a7059b15aa834abf2671ef28708f8
-
SSDEEP
3072:m7JN07Kkj7kE5Ft4rTy/MD89bUDlgAfiTMhtlxfhXXV:mf+7fQO289bUBgAfRB7XX
Behavioral task
behavioral1
Sample
testpanderequests.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
testpanderequests.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
gurcu
https://api.telegram.org/bot5975822207:AAFJtzAlzLoF8RfkpKUagQJGRi0ksib6w3g/sendMessage?chat_id=1396661331
Targets
-
-
Target
testpanderequests.exe.bin
-
Size
186KB
-
MD5
7e7e25597f56f24d262e989abbb31222
-
SHA1
f3342f1c948a2ef8775d72389cfb76adc7c7ed21
-
SHA256
99c5747e5ada4de53bbed50ae5670f04ef4584632c873a060f54f42c70fbcf8c
-
SHA512
0872e14e4ec016ba0489b9ef26f3295173dc5ab37d92f93d2074e2ea518503945dcdaa6e4990942ee9c80bf1dc56d654c77a7059b15aa834abf2671ef28708f8
-
SSDEEP
3072:m7JN07Kkj7kE5Ft4rTy/MD89bUDlgAfiTMhtlxfhXXV:mf+7fQO289bUBgAfRB7XX
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-