General

  • Target

    dac11aa9a60e91e8370a216e95c059758a3dd0f960d354f71c7975abac675122.exe

  • Size

    1.3MB

  • Sample

    241124-gxvm3axmhv

  • MD5

    6036ccabba8a405dbc98cfa3171f4019

  • SHA1

    dfffc5f90e5c4f207f5d772a1db64b13b6e003f8

  • SHA256

    dac11aa9a60e91e8370a216e95c059758a3dd0f960d354f71c7975abac675122

  • SHA512

    c8ceb801770756800abf2a57cd2a9e6245acbc7975ceed0adea2ce0512eb07229e452bf5e6e994ab37f7084ed0845f9308f903cba6cd82a36507897d392762bf

  • SSDEEP

    24576:XN4EfsPHd9VbyiKSnKMnsNneRWrN2jHwTxbMmgCyq3eca44zpRPtHSr:9z0/0iKSnKYsNn4WZ2LwQNGeca4aPl2

Malware Config

Targets

    • Target

      dac11aa9a60e91e8370a216e95c059758a3dd0f960d354f71c7975abac675122.exe

    • Size

      1.3MB

    • MD5

      6036ccabba8a405dbc98cfa3171f4019

    • SHA1

      dfffc5f90e5c4f207f5d772a1db64b13b6e003f8

    • SHA256

      dac11aa9a60e91e8370a216e95c059758a3dd0f960d354f71c7975abac675122

    • SHA512

      c8ceb801770756800abf2a57cd2a9e6245acbc7975ceed0adea2ce0512eb07229e452bf5e6e994ab37f7084ed0845f9308f903cba6cd82a36507897d392762bf

    • SSDEEP

      24576:XN4EfsPHd9VbyiKSnKMnsNneRWrN2jHwTxbMmgCyq3eca44zpRPtHSr:9z0/0iKSnKYsNn4WZ2LwQNGeca4aPl2

    • Ouroboros family

    • Ouroboros/Zeropadypt

      Ransomware family based on open-source CryptoWire.

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Pandastealer family

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks