General
-
Target
e0c94322110f60ff3aeda374185e6b68
-
Size
2.8MB
-
Sample
240327-e7w8jach45
-
MD5
e0c94322110f60ff3aeda374185e6b68
-
SHA1
d5e796db9f639ff829ce374c3b8e6087a2913f3b
-
SHA256
c148633e99f5d088da8d94c65e5c8c0c081bf9058e095c6f77f711735dfe1257
-
SHA512
1e2a3649e861babb0c113f24c607b4eca5a0eb7b7d704928421c46e19d18efbcf741eedc51dc0d1721db50bc38ff068b98e5cab20ad9a81fb0514792c886bef0
-
SSDEEP
49152:6eUV/73SWNJimjrwZjDp+ll42k1vKiL09UJUfk4gbWmikhrdnGiX:HUV/pM7ZjD8lnovlNJUc4gKmdPn3X
Behavioral task
behavioral1
Sample
e0c94322110f60ff3aeda374185e6b68.exe
Resource
win7-20231129-en
Malware Config
Extracted
pandastealer
$_��
http://Q�$��&"�$WV��d}�ց� �%��/�8d��^�|$_S����
Extracted
pandastealer
1.11
http://f0567020.xsph.ru
Targets
-
-
Target
e0c94322110f60ff3aeda374185e6b68
-
Size
2.8MB
-
MD5
e0c94322110f60ff3aeda374185e6b68
-
SHA1
d5e796db9f639ff829ce374c3b8e6087a2913f3b
-
SHA256
c148633e99f5d088da8d94c65e5c8c0c081bf9058e095c6f77f711735dfe1257
-
SHA512
1e2a3649e861babb0c113f24c607b4eca5a0eb7b7d704928421c46e19d18efbcf741eedc51dc0d1721db50bc38ff068b98e5cab20ad9a81fb0514792c886bef0
-
SSDEEP
49152:6eUV/73SWNJimjrwZjDp+ll42k1vKiL09UJUfk4gbWmikhrdnGiX:HUV/pM7ZjD8lnovlNJUc4gKmdPn3X
-
Panda Stealer payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-