General
-
Target
edad239f7872ba1c6aa40e9f20894129
-
Size
1.7MB
-
Sample
231220-vccteagaeq
-
MD5
edad239f7872ba1c6aa40e9f20894129
-
SHA1
9edb6487a5bbb07aa337afd2c2764913813c9814
-
SHA256
05c43a95ca5fc29b575a8417237b5868abc223c60ade4cd2487aef16814b48f1
-
SHA512
6ebc98f76003897d359756194766ed5b7a4a3ad2bc02e07826449302495fd8a8b365fe59fcf68d5202dd42d828c3c077f988f9a1a2b4eb501ba6a4381f431490
-
SSDEEP
24576:/mv94J5AWlk5JiFJlYGCrvLAOP6/CFa/gTQ/3zzqIrSJuic6jg/nYNB+FnOgtiNS:yW3AU+SKrvLAOPZaDGtJVkYnGOgEjhu
Static task
static1
Behavioral task
behavioral1
Sample
edad239f7872ba1c6aa40e9f20894129.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
edad239f7872ba1c6aa40e9f20894129.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
pandastealer
1.11
http://a0588174.xsph.ru
Targets
-
-
Target
edad239f7872ba1c6aa40e9f20894129
-
Size
1.7MB
-
MD5
edad239f7872ba1c6aa40e9f20894129
-
SHA1
9edb6487a5bbb07aa337afd2c2764913813c9814
-
SHA256
05c43a95ca5fc29b575a8417237b5868abc223c60ade4cd2487aef16814b48f1
-
SHA512
6ebc98f76003897d359756194766ed5b7a4a3ad2bc02e07826449302495fd8a8b365fe59fcf68d5202dd42d828c3c077f988f9a1a2b4eb501ba6a4381f431490
-
SSDEEP
24576:/mv94J5AWlk5JiFJlYGCrvLAOP6/CFa/gTQ/3zzqIrSJuic6jg/nYNB+FnOgtiNS:yW3AU+SKrvLAOPZaDGtJVkYnGOgEjhu
Score10/10-
Panda Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-