Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 17:06
Behavioral task
behavioral1
Sample
57061804ee3f62601d4147b0e0953ab4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
57061804ee3f62601d4147b0e0953ab4.exe
Resource
win10v2004-20231215-en
General
-
Target
57061804ee3f62601d4147b0e0953ab4.exe
-
Size
681KB
-
MD5
57061804ee3f62601d4147b0e0953ab4
-
SHA1
d3ca90ea276a8fffe5e46b6c79f4193d7c84d9cc
-
SHA256
ebff40457d5e51cfe5b3cbe132131ec6a7f44daeac67ead885e1498bf2275979
-
SHA512
30af8c0f18235340c4c571cb06238c52b332d293d1151e6913bf9c426b2a9fa72dbba89bcc6c20099946fe2fb15f1722d00c2229fbf2ea42f7a0c70da69e5662
-
SSDEEP
12288:VoJqNIPtNmO6IOOEp0TMlja7NRl2PSVikIyoyueh+AkHcnLwuukoCOD6zlijOz+2:VoJEKZ6IEGTMxapRl2PSwHTehy6Bp+p4
Malware Config
Signatures
-
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4840 57061804ee3f62601d4147b0e0953ab4.exe 4840 57061804ee3f62601d4147b0e0953ab4.exe