General
-
Target
b0b8c0c4406b0affc0426178a51765f900dc78a35a55e0fcf9eaf50f0bead8d1N.exe
-
Size
3.1MB
-
Sample
241117-f6nqfawqcl
-
MD5
dbd6cff14566906c6a821d7f6c148720
-
SHA1
a9b433bb268223f35e1bc42c79de7917c3592e13
-
SHA256
b0b8c0c4406b0affc0426178a51765f900dc78a35a55e0fcf9eaf50f0bead8d1
-
SHA512
0a2baea156fb8a5f8785a65e263016e344677d16a3f406658985bed55d6d16968fe2bac843b8a30fc864e61858bb76411f77c578f8adf96156bf8389f57360d5
-
SSDEEP
49152:CHEewueEMkwkN4AxZOGY/g0yiluZdGwEbe7d:
Static task
static1
Behavioral task
behavioral1
Sample
b0b8c0c4406b0affc0426178a51765f900dc78a35a55e0fcf9eaf50f0bead8d1N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b0b8c0c4406b0affc0426178a51765f900dc78a35a55e0fcf9eaf50f0bead8d1N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b0b8c0c4406b0affc0426178a51765f900dc78a35a55e0fcf9eaf50f0bead8d1N.exe
-
Size
3.1MB
-
MD5
dbd6cff14566906c6a821d7f6c148720
-
SHA1
a9b433bb268223f35e1bc42c79de7917c3592e13
-
SHA256
b0b8c0c4406b0affc0426178a51765f900dc78a35a55e0fcf9eaf50f0bead8d1
-
SHA512
0a2baea156fb8a5f8785a65e263016e344677d16a3f406658985bed55d6d16968fe2bac843b8a30fc864e61858bb76411f77c578f8adf96156bf8389f57360d5
-
SSDEEP
49152:CHEewueEMkwkN4AxZOGY/g0yiluZdGwEbe7d:
Score10/10-
Panda Stealer payload
-
Pandastealer family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-