General
-
Target
App_Installer.rar
-
Size
54.2MB
-
Sample
230619-xmr27aff93
-
MD5
fe23de02f27f300a7ef4af2837f63012
-
SHA1
0d6eb750212ffe2f0374ec828e542b7e9d8a9e54
-
SHA256
06b489080a5addb9ed1163500a9950649cc0830a9e7dc88bfa5ac0ecaf34c912
-
SHA512
97a4632abb6c8d40d4ce149d62a1e30781119e0c69913791aa3a448d66e937abc61294c0dbc8ba4e6bad4d54924d905d6daaefd9bcaec91ea591cd1ec42c6c48
-
SSDEEP
1572864:kCIXlP/Y9QcvV0N8Wg7WjLJapYOIPRaGlm+bGydFqv2cgD:d21/4vWpg7n+O+tfb/zZ5
Static task
static1
Behavioral task
behavioral1
Sample
Setup app.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Setup app.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
Setup app.exe
-
Size
8.5MB
-
MD5
3d1b6eebe4f703befa68842a2d0e9cb4
-
SHA1
df688e6cf11742bf8f6a65dee4bd52758f33660d
-
SHA256
ef9c84f01fb46f8ffc7829abc2b0de296fc2dc8ff93eee949c5f2171092b70da
-
SHA512
8d4844ee5de6e01336f9a67e64efd10ee305173a54dbf945a41fc5e0d71e6195b70127c9345069cdd816f07aa78021da2bfa3049f15831b07888844e50f4fd9c
-
SSDEEP
196608:35OllhOTapKB1erCbptqBYHvTYTVHJack+YlGlSRRbCvY:35WlhOTapG1erqpICHvTMacJYlTFP
Score10/10-
Panda Stealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-