General
-
Target
abdd8d2b92994b87215496904e6f7b352de5391eab24275a394c6eb018d29273
-
Size
24.8MB
-
Sample
231123-dq59fage4z
-
MD5
2a7a396903e48cf898f8e9c6c77a875d
-
SHA1
6547cbb2947e005c9ea42539107b98db8b9c77d7
-
SHA256
abdd8d2b92994b87215496904e6f7b352de5391eab24275a394c6eb018d29273
-
SHA512
63689d85ae71a1a703d58b16b5c45891c8048e1eb63252b105eee640b5923f7ac882ab767f7cc3089e0b919d7e6a826d5c6220fb1d7dee4ea284e2f172b1e189
-
SSDEEP
393216:F8QZskDN3u5yyHTV7JDL9a+43tFuUiuJzuFfTy1J4uz4SfPIY:F8QZsudeDL9n43X9iuNWTS9X3
Static task
static1
Behavioral task
behavioral1
Sample
abdd8d2b92994b87215496904e6f7b352de5391eab24275a394c6eb018d29273.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
abdd8d2b92994b87215496904e6f7b352de5391eab24275a394c6eb018d29273.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
pandastealer
:�=��^V��p��X7����E|^�fh�8v��4��ok)�E�B�u�:�,�=M懼:AGd�.�eM�w��̻����*
http://�p��X7����E|^�fh�8v��4��ok)�E�B�u�:�,�=M懼:AGd�.�eM�w��̻����*
Extracted
pandastealer
1.11
http://f0854165.xsph.ru
Targets
-
-
Target
abdd8d2b92994b87215496904e6f7b352de5391eab24275a394c6eb018d29273
-
Size
24.8MB
-
MD5
2a7a396903e48cf898f8e9c6c77a875d
-
SHA1
6547cbb2947e005c9ea42539107b98db8b9c77d7
-
SHA256
abdd8d2b92994b87215496904e6f7b352de5391eab24275a394c6eb018d29273
-
SHA512
63689d85ae71a1a703d58b16b5c45891c8048e1eb63252b105eee640b5923f7ac882ab767f7cc3089e0b919d7e6a826d5c6220fb1d7dee4ea284e2f172b1e189
-
SSDEEP
393216:F8QZskDN3u5yyHTV7JDL9a+43tFuUiuJzuFfTy1J4uz4SfPIY:F8QZsudeDL9n43X9iuNWTS9X3
-
Modifies security service
-
Panda Stealer payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Possible privilege escalation attempt
-
Stops running service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1