General

  • Target

    7921941dfa8e0c8279ffa1e4fff1a654

  • Size

    2.9MB

  • Sample

    240127-dq98dsddfr

  • MD5

    7921941dfa8e0c8279ffa1e4fff1a654

  • SHA1

    4f505603cb319773633acba645ca754037df9e16

  • SHA256

    69ceba8b39719c757096d6979c8100c4a281efb253b995cfe4477ac174898383

  • SHA512

    e7e6cdb1b9727169f5d96a941f277a2d6d47b3625e2e77da99cecec39f4adf9ba66d834d4728d278141ec8745a400edc78afc87579cb1f81967956e30cf6c8f2

  • SSDEEP

    49152:8+8IPBm/7iZBbxqCghyHfMm+UbE9ETZOIC7pR0eyb1CDDoiu2kVwcVHR7eA7+VSz:8+/S2v9QIfFEsOICNOeSCD8i1qHZeA7x

Malware Config

Extracted

Family

pandastealer

Version

l�$����

C2

http://

Extracted

Family

pandastealer

Version

1.11

C2

http://f0567127.xsph.ru

Extracted

Family

pandastealer

Version

�1�0

C2

http://����

Targets

    • Target

      7921941dfa8e0c8279ffa1e4fff1a654

    • Size

      2.9MB

    • MD5

      7921941dfa8e0c8279ffa1e4fff1a654

    • SHA1

      4f505603cb319773633acba645ca754037df9e16

    • SHA256

      69ceba8b39719c757096d6979c8100c4a281efb253b995cfe4477ac174898383

    • SHA512

      e7e6cdb1b9727169f5d96a941f277a2d6d47b3625e2e77da99cecec39f4adf9ba66d834d4728d278141ec8745a400edc78afc87579cb1f81967956e30cf6c8f2

    • SSDEEP

      49152:8+8IPBm/7iZBbxqCghyHfMm+UbE9ETZOIC7pR0eyb1CDDoiu2kVwcVHR7eA7+VSz:8+/S2v9QIfFEsOICNOeSCD8i1qHZeA7x

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks