Analysis
-
max time kernel
206s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2023 12:51
Behavioral task
behavioral1
Sample
AHK УСТАНОВИТЬ.exe
Resource
win10-20231025-en
Behavioral task
behavioral2
Sample
AHK УСТАНОВИТЬ.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
AutoArmy 2.8.exe
Resource
win10-20231020-en
Behavioral task
behavioral4
Sample
AutoArmy 2.8.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
Инструкция.txt
Resource
win10-20231023-en
Behavioral task
behavioral6
Sample
Инструкция.txt
Resource
win10v2004-20231020-en
General
-
Target
AHK УСТАНОВИТЬ.exe
-
Size
5.7MB
-
MD5
44968ce1b7dcb66e85573e43bc809431
-
SHA1
7aec81e4d366087eedc4564cb88cedb6062f5c3b
-
SHA256
c78d5b1b5badb9608c666ff5c592329ebe59ae221266fed77a3dcd188900019f
-
SHA512
92c20d7e645b513f865a68bd0e3c1948053183fbd40e59ac273784b498af1d3a4c81d3a24af2dc957df93e523fa9da1c0889968805de1eaa9e295e08b8945bc1
-
SSDEEP
98304:9VFdwkzNzkjRNx7z43Kp44F6sFLT0RLTByc2vtlHXa7UJ73jlbMXS3I:b3wkC5U5AMBgcmKarjl4S3
Malware Config
Extracted
pandastealer
1.11
http://libscripthubs.mcdir.me
Signatures
-
Panda Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/4652-0-0x00000000009B0000-0x0000000001353000-memory.dmp family_pandastealer behavioral2/memory/4652-4-0x00000000009B0000-0x0000000001353000-memory.dmp family_pandastealer behavioral2/memory/4652-41-0x00000000009B0000-0x0000000001353000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4652-0-0x00000000009B0000-0x0000000001353000-memory.dmp vmprotect behavioral2/memory/4652-4-0x00000000009B0000-0x0000000001353000-memory.dmp vmprotect behavioral2/memory/4652-41-0x00000000009B0000-0x0000000001353000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4652 AHK УСТАНОВИТЬ.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4652 AHK УСТАНОВИТЬ.exe 4652 AHK УСТАНОВИТЬ.exe 4652 AHK УСТАНОВИТЬ.exe 4652 AHK УСТАНОВИТЬ.exe