Analysis
-
max time kernel
89s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2024 16:13
Behavioral task
behavioral1
Sample
8f97e558eec7e93afb68db5f8aa49713.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f97e558eec7e93afb68db5f8aa49713.exe
Resource
win10v2004-20231222-en
General
-
Target
8f97e558eec7e93afb68db5f8aa49713.exe
-
Size
5.7MB
-
MD5
8f97e558eec7e93afb68db5f8aa49713
-
SHA1
96b72d8f0f07fc640a0d7c22277450177950e4c4
-
SHA256
4356e334b5e726215e488ce5864601daf0ed5f84cd7fbb65943fb1625731e8b2
-
SHA512
08ec3ee975a2284e1f5f6ffe65b7d47acf483148d936146545cc32b7516822d68a0f0a854bb9858e9145ecfbc3509b7901c3f0aaa526fbfe23d6e37ce19fe6be
-
SSDEEP
98304:fDSCjP7797PBa5G3WBv2K9HoUTpcuUWdLpQXfisZkgWWuCNrzBhR/NHRfkC/Pc7h:9jz797Z32+2HT+EpQX6jIhzB5RfTHqX+
Malware Config
Extracted
pandastealer
1.11
http://f0566310.xsph.ru
Signatures
-
Panda Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/4112-0-0x0000000000910000-0x00000000012B2000-memory.dmp family_pandastealer behavioral2/memory/4112-3-0x0000000000910000-0x00000000012B2000-memory.dmp family_pandastealer behavioral2/memory/4112-40-0x0000000000910000-0x00000000012B2000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4112-0-0x0000000000910000-0x00000000012B2000-memory.dmp vmprotect behavioral2/memory/4112-3-0x0000000000910000-0x00000000012B2000-memory.dmp vmprotect behavioral2/memory/4112-40-0x0000000000910000-0x00000000012B2000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4112 8f97e558eec7e93afb68db5f8aa49713.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4112 8f97e558eec7e93afb68db5f8aa49713.exe 4112 8f97e558eec7e93afb68db5f8aa49713.exe 4112 8f97e558eec7e93afb68db5f8aa49713.exe 4112 8f97e558eec7e93afb68db5f8aa49713.exe