General
-
Target
dac11aa9a60e91e8370a216e95c059758a3dd0f960d354f71c7975abac675122.exe
-
Size
1.3MB
-
Sample
241124-gxvm3axmhv
-
MD5
6036ccabba8a405dbc98cfa3171f4019
-
SHA1
dfffc5f90e5c4f207f5d772a1db64b13b6e003f8
-
SHA256
dac11aa9a60e91e8370a216e95c059758a3dd0f960d354f71c7975abac675122
-
SHA512
c8ceb801770756800abf2a57cd2a9e6245acbc7975ceed0adea2ce0512eb07229e452bf5e6e994ab37f7084ed0845f9308f903cba6cd82a36507897d392762bf
-
SSDEEP
24576:XN4EfsPHd9VbyiKSnKMnsNneRWrN2jHwTxbMmgCyq3eca44zpRPtHSr:9z0/0iKSnKYsNn4WZ2LwQNGeca4aPl2
Behavioral task
behavioral1
Sample
dac11aa9a60e91e8370a216e95c059758a3dd0f960d354f71c7975abac675122.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dac11aa9a60e91e8370a216e95c059758a3dd0f960d354f71c7975abac675122.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
dac11aa9a60e91e8370a216e95c059758a3dd0f960d354f71c7975abac675122.exe
-
Size
1.3MB
-
MD5
6036ccabba8a405dbc98cfa3171f4019
-
SHA1
dfffc5f90e5c4f207f5d772a1db64b13b6e003f8
-
SHA256
dac11aa9a60e91e8370a216e95c059758a3dd0f960d354f71c7975abac675122
-
SHA512
c8ceb801770756800abf2a57cd2a9e6245acbc7975ceed0adea2ce0512eb07229e452bf5e6e994ab37f7084ed0845f9308f903cba6cd82a36507897d392762bf
-
SSDEEP
24576:XN4EfsPHd9VbyiKSnKMnsNneRWrN2jHwTxbMmgCyq3eca44zpRPtHSr:9z0/0iKSnKYsNn4WZ2LwQNGeca4aPl2
-
Ouroboros family
-
Panda Stealer payload
-
Pandastealer family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1