General

  • Target

    f254e5be8e7dd4bccf602648eea53295_JaffaCakes118

  • Size

    5.8MB

  • Sample

    240416-bfemmafb3t

  • MD5

    f254e5be8e7dd4bccf602648eea53295

  • SHA1

    7aac3880436eb6e1668630bba480d1943ad3e4a1

  • SHA256

    43a4364f8ce930a1d8f55bf226a18251863e15f67ac1d85e7eef20d95e11fc7c

  • SHA512

    0c74185622ca8d6a43107a0284f73e44cd5d21aa296f0c3ad1c95fb6e55ac0a00420ca8ccb2a1cc89447485887abcec6cccb24aa2bfd1befdeda5ac572538f80

  • SSDEEP

    98304:EOAGCKb28pfHUJ4+ho4a7vFM8Fa4KRkNVEbR/JYll3FArv+ByaOHqe8mX:LAGC8VmC+hnTl49EbN0MrA40m

Malware Config

Extracted

Family

pandastealer

Version

1.11

C2

http://f0564653.xsph.ru

Targets

    • Target

      f254e5be8e7dd4bccf602648eea53295_JaffaCakes118

    • Size

      5.8MB

    • MD5

      f254e5be8e7dd4bccf602648eea53295

    • SHA1

      7aac3880436eb6e1668630bba480d1943ad3e4a1

    • SHA256

      43a4364f8ce930a1d8f55bf226a18251863e15f67ac1d85e7eef20d95e11fc7c

    • SHA512

      0c74185622ca8d6a43107a0284f73e44cd5d21aa296f0c3ad1c95fb6e55ac0a00420ca8ccb2a1cc89447485887abcec6cccb24aa2bfd1befdeda5ac572538f80

    • SSDEEP

      98304:EOAGCKb28pfHUJ4+ho4a7vFM8Fa4KRkNVEbR/JYll3FArv+ByaOHqe8mX:LAGC8VmC+hnTl49EbN0MrA40m

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks