General

  • Target

    ffc21cddf522b1800d41b4a41da2c24e_JaffaCakes118

  • Size

    3.4MB

  • Sample

    240930-cs1w3asgqq

  • MD5

    ffc21cddf522b1800d41b4a41da2c24e

  • SHA1

    bdcbe7b199cb8531b2262c37d3e535ffc5aa72e7

  • SHA256

    7a97516b3a8eff94b12dbaa5538373921f076b13ac3865d3299749a701510db6

  • SHA512

    9479f902ee5a70bc76a44e418a9a012024ba88dcc8f7b02acdb414f61516bfe0e5c41c2f52f591b8d201612b26021d853a68261eeb6c072dcb969d270e7b5079

  • SSDEEP

    98304:oTLr/vwnSlGuICx42P2ivKIrZzOMIobLCWe0M+v/1:o3rGcGskinrZ9CQX

Malware Config

Targets

    • Target

      ffc21cddf522b1800d41b4a41da2c24e_JaffaCakes118

    • Size

      3.4MB

    • MD5

      ffc21cddf522b1800d41b4a41da2c24e

    • SHA1

      bdcbe7b199cb8531b2262c37d3e535ffc5aa72e7

    • SHA256

      7a97516b3a8eff94b12dbaa5538373921f076b13ac3865d3299749a701510db6

    • SHA512

      9479f902ee5a70bc76a44e418a9a012024ba88dcc8f7b02acdb414f61516bfe0e5c41c2f52f591b8d201612b26021d853a68261eeb6c072dcb969d270e7b5079

    • SSDEEP

      98304:oTLr/vwnSlGuICx42P2ivKIrZzOMIobLCWe0M+v/1:o3rGcGskinrZ9CQX

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks