General

  • Target

    df4e68852040ee5abdd047c8d358bcfd

  • Size

    5.8MB

  • Sample

    240326-qzv62sed7y

  • MD5

    df4e68852040ee5abdd047c8d358bcfd

  • SHA1

    b2d077578e9d4326b47d5b2002ea447209e4f32f

  • SHA256

    3c4747711e6ea57f84af33e1676740a0a25f899283ee994cf23fe3aaf55aed59

  • SHA512

    53c888abb92207efe8590b0d7fb790d04681da466bb8d8a0b24548213f3c69d3487f42a4cbcb4eed2ce53b14644af1f6b713a3ea5dff9d05f8cac835ea802b0d

  • SSDEEP

    98304:6E2+izM+YzKruSagC+R3ov+mukYBoGrQV8cMiK8YV6r8ZFDrk0uS:6EjizM+YzKZaioG///4xE8/r8ZFD4pS

Malware Config

Extracted

Family

pandastealer

Version

1.11

C2

http://f0565988.xsph.ru

Targets

    • Target

      df4e68852040ee5abdd047c8d358bcfd

    • Size

      5.8MB

    • MD5

      df4e68852040ee5abdd047c8d358bcfd

    • SHA1

      b2d077578e9d4326b47d5b2002ea447209e4f32f

    • SHA256

      3c4747711e6ea57f84af33e1676740a0a25f899283ee994cf23fe3aaf55aed59

    • SHA512

      53c888abb92207efe8590b0d7fb790d04681da466bb8d8a0b24548213f3c69d3487f42a4cbcb4eed2ce53b14644af1f6b713a3ea5dff9d05f8cac835ea802b0d

    • SSDEEP

      98304:6E2+izM+YzKruSagC+R3ov+mukYBoGrQV8cMiK8YV6r8ZFDrk0uS:6EjizM+YzKZaioG///4xE8/r8ZFD4pS

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks