General

  • Target

    1f34c55864419956aca02c0dbf79c4bc.exe

  • Size

    2.6MB

  • Sample

    241203-qdtfbsskgk

  • MD5

    1f34c55864419956aca02c0dbf79c4bc

  • SHA1

    88381f7767b8ba4c4cb5d5000784234bfc814743

  • SHA256

    e4867d9b764864ae4d9e0170d10765ead2ceb3767585c9c1a4e93080b2f32286

  • SHA512

    108666d7d53041577e2edac189e8268bc819f46972ef98f78241746966ad907b1cb7dd492082c016b78d1a8c9ff916d4cca6ba01f56c648254f79cc3f21eaab7

  • SSDEEP

    49152:V3AQbdYAm4zEbdYAm4zWbdYAm4z23Aw3AWbdYAm4zSbdYAm4zO3AkwUQoT7v/zh:RAadrWdr0drkAiA0dr4dr8AlUQofv/d

Malware Config

Targets

    • Target

      1f34c55864419956aca02c0dbf79c4bc.exe

    • Size

      2.6MB

    • MD5

      1f34c55864419956aca02c0dbf79c4bc

    • SHA1

      88381f7767b8ba4c4cb5d5000784234bfc814743

    • SHA256

      e4867d9b764864ae4d9e0170d10765ead2ceb3767585c9c1a4e93080b2f32286

    • SHA512

      108666d7d53041577e2edac189e8268bc819f46972ef98f78241746966ad907b1cb7dd492082c016b78d1a8c9ff916d4cca6ba01f56c648254f79cc3f21eaab7

    • SSDEEP

      49152:V3AQbdYAm4zEbdYAm4zWbdYAm4z23Aw3AWbdYAm4zSbdYAm4zO3AkwUQoT7v/zh:RAadrWdr0drkAiA0dr4dr8AlUQofv/d

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Pandastealer family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks