Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-02-2024 11:02
Behavioral task
behavioral1
Sample
9b80f5c9c1cd7d2d13d6c41d35e0c21f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b80f5c9c1cd7d2d13d6c41d35e0c21f.exe
Resource
win10v2004-20231215-en
General
-
Target
9b80f5c9c1cd7d2d13d6c41d35e0c21f.exe
-
Size
5.6MB
-
MD5
9b80f5c9c1cd7d2d13d6c41d35e0c21f
-
SHA1
6df7b192b2c140552feaf951090ca54a01640f77
-
SHA256
62a1d37c063d4835060b531f903bc99d8f807e8f52077e6ece25c8f53af84d74
-
SHA512
1b6a33ae5275653eaafeeba81e0cf1df466a0a6e66647f662765cccb28c122d1a9d22baa977f623ac6b094c0e064e434f6981261136343209de2b3375f9cd609
-
SSDEEP
98304:jO2z45deXEXN1NLNsI2xebYryeeKQsJ4rPB2EAV5ZEseq3q9/A7Co8+klmxKw:i2z45XXN1T2xebYpeKHJwP0KPq3kAmoF
Malware Config
Signatures
-
Panda Stealer payload 3 IoCs
resource yara_rule behavioral1/memory/3040-0-0x0000000000D20000-0x0000000001655000-memory.dmp family_pandastealer behavioral1/memory/3040-12-0x0000000000D20000-0x0000000001655000-memory.dmp family_pandastealer behavioral1/memory/3040-28-0x0000000000D20000-0x0000000001655000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Shurk Stealer payload 3 IoCs
resource yara_rule behavioral1/memory/3040-0-0x0000000000D20000-0x0000000001655000-memory.dmp shurk_stealer behavioral1/memory/3040-12-0x0000000000D20000-0x0000000001655000-memory.dmp shurk_stealer behavioral1/memory/3040-28-0x0000000000D20000-0x0000000001655000-memory.dmp shurk_stealer -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3040-0-0x0000000000D20000-0x0000000001655000-memory.dmp vmprotect behavioral1/memory/3040-12-0x0000000000D20000-0x0000000001655000-memory.dmp vmprotect behavioral1/memory/3040-28-0x0000000000D20000-0x0000000001655000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3040 9b80f5c9c1cd7d2d13d6c41d35e0c21f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3040 9b80f5c9c1cd7d2d13d6c41d35e0c21f.exe 3040 9b80f5c9c1cd7d2d13d6c41d35e0c21f.exe