General

  • Target

    pandabuy.exe

  • Size

    39.0MB

  • Sample

    240410-zsys2abc97

  • MD5

    f4fd9ada7c634ac21b80fb8a7d7f7e2b

  • SHA1

    d0ab3fa95eccfeedd30fb275ca077fc5691b69c4

  • SHA256

    0d32aa71339bc589d953a54a466339a4e6ccb320ad22c7ae1e05b6ebb54043b9

  • SHA512

    f1fca30ccd947c6b166dbc7f10ae1e8826ff37f0cb6772b52a46a43b1c58867f9000ba1fa176850cce52ca16675f0376fc32edc485b613bb6a2fe06560a00ad7

  • SSDEEP

    393216:z99S6hIo/zxetEL+9qz8sEnBSVkRIrY873o1lVyIp1wKOTa64oH4/aDLcsOJ:z93IEB+9q4BzcY873YlVyIp1BOBHHX

Score
7/10

Malware Config

Targets

    • Target

      pandabuy.exe

    • Size

      39.0MB

    • MD5

      f4fd9ada7c634ac21b80fb8a7d7f7e2b

    • SHA1

      d0ab3fa95eccfeedd30fb275ca077fc5691b69c4

    • SHA256

      0d32aa71339bc589d953a54a466339a4e6ccb320ad22c7ae1e05b6ebb54043b9

    • SHA512

      f1fca30ccd947c6b166dbc7f10ae1e8826ff37f0cb6772b52a46a43b1c58867f9000ba1fa176850cce52ca16675f0376fc32edc485b613bb6a2fe06560a00ad7

    • SSDEEP

      393216:z99S6hIo/zxetEL+9qz8sEnBSVkRIrY873o1lVyIp1wKOTa64oH4/aDLcsOJ:z93IEB+9q4BzcY873YlVyIp1BOBHHX

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks