Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2023 15:07
Behavioral task
behavioral1
Sample
d24a0135c8a88a44bbbd7dfa3e1ab352.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d24a0135c8a88a44bbbd7dfa3e1ab352.exe
Resource
win10v2004-20231215-en
General
-
Target
d24a0135c8a88a44bbbd7dfa3e1ab352.exe
-
Size
5.7MB
-
MD5
d24a0135c8a88a44bbbd7dfa3e1ab352
-
SHA1
0dda1c47ec3eb2f6b1c44cfa3a098f46221d4a59
-
SHA256
56db8b3fc993b1f1636c39c7cc3d2a5b207fccea627da1ebe36d7bbf1deca855
-
SHA512
0703114175ea9b368fda6a8e88b13492360374e9819e325278f4595c9c1f31994fed3c293bff752ed0c23851df7a48fe2ee11c729ab44f7169a73f0e08d88c59
-
SSDEEP
98304:mfmUu/4YTZKNsLgv+eOcfsZTWgfwzqJTRvOSHm4CfFecy4KttqCTf:x/4YTZKNs8f9HO+qJT9zHHKPytD
Malware Config
Extracted
pandastealer
1.11
http://f0585194.xsph.ru
Signatures
-
Panda Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/4148-0-0x0000000000920000-0x00000000012C6000-memory.dmp family_pandastealer behavioral2/memory/4148-3-0x0000000000920000-0x00000000012C6000-memory.dmp family_pandastealer behavioral2/memory/4148-40-0x0000000000920000-0x00000000012C6000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4148-0-0x0000000000920000-0x00000000012C6000-memory.dmp vmprotect behavioral2/memory/4148-3-0x0000000000920000-0x00000000012C6000-memory.dmp vmprotect behavioral2/memory/4148-40-0x0000000000920000-0x00000000012C6000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4148 d24a0135c8a88a44bbbd7dfa3e1ab352.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4148 d24a0135c8a88a44bbbd7dfa3e1ab352.exe 4148 d24a0135c8a88a44bbbd7dfa3e1ab352.exe 4148 d24a0135c8a88a44bbbd7dfa3e1ab352.exe 4148 d24a0135c8a88a44bbbd7dfa3e1ab352.exe