Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20-12-2023 15:07
Behavioral task
behavioral1
Sample
d24a0135c8a88a44bbbd7dfa3e1ab352.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d24a0135c8a88a44bbbd7dfa3e1ab352.exe
Resource
win10v2004-20231215-en
General
-
Target
d24a0135c8a88a44bbbd7dfa3e1ab352.exe
-
Size
5.7MB
-
MD5
d24a0135c8a88a44bbbd7dfa3e1ab352
-
SHA1
0dda1c47ec3eb2f6b1c44cfa3a098f46221d4a59
-
SHA256
56db8b3fc993b1f1636c39c7cc3d2a5b207fccea627da1ebe36d7bbf1deca855
-
SHA512
0703114175ea9b368fda6a8e88b13492360374e9819e325278f4595c9c1f31994fed3c293bff752ed0c23851df7a48fe2ee11c729ab44f7169a73f0e08d88c59
-
SSDEEP
98304:mfmUu/4YTZKNsLgv+eOcfsZTWgfwzqJTRvOSHm4CfFecy4KttqCTf:x/4YTZKNs8f9HO+qJT9zHHKPytD
Malware Config
Extracted
pandastealer
1.11
http://f0585194.xsph.ru
Signatures
-
Panda Stealer payload 3 IoCs
resource yara_rule behavioral1/memory/2656-0-0x0000000000E30000-0x00000000017D6000-memory.dmp family_pandastealer behavioral1/memory/2656-11-0x0000000000E30000-0x00000000017D6000-memory.dmp family_pandastealer behavioral1/memory/2656-36-0x0000000000E30000-0x00000000017D6000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2656-0-0x0000000000E30000-0x00000000017D6000-memory.dmp vmprotect behavioral1/memory/2656-11-0x0000000000E30000-0x00000000017D6000-memory.dmp vmprotect behavioral1/memory/2656-36-0x0000000000E30000-0x00000000017D6000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2656 d24a0135c8a88a44bbbd7dfa3e1ab352.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2656 d24a0135c8a88a44bbbd7dfa3e1ab352.exe 2656 d24a0135c8a88a44bbbd7dfa3e1ab352.exe