General
-
Target
1f34c55864419956aca02c0dbf79c4bc.exe
-
Size
2.6MB
-
Sample
241203-qdtfbsskgk
-
MD5
1f34c55864419956aca02c0dbf79c4bc
-
SHA1
88381f7767b8ba4c4cb5d5000784234bfc814743
-
SHA256
e4867d9b764864ae4d9e0170d10765ead2ceb3767585c9c1a4e93080b2f32286
-
SHA512
108666d7d53041577e2edac189e8268bc819f46972ef98f78241746966ad907b1cb7dd492082c016b78d1a8c9ff916d4cca6ba01f56c648254f79cc3f21eaab7
-
SSDEEP
49152:V3AQbdYAm4zEbdYAm4zWbdYAm4z23Aw3AWbdYAm4zSbdYAm4zO3AkwUQoT7v/zh:RAadrWdr0drkAiA0dr4dr8AlUQofv/d
Static task
static1
Behavioral task
behavioral1
Sample
1f34c55864419956aca02c0dbf79c4bc.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1f34c55864419956aca02c0dbf79c4bc.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
1f34c55864419956aca02c0dbf79c4bc.exe
-
Size
2.6MB
-
MD5
1f34c55864419956aca02c0dbf79c4bc
-
SHA1
88381f7767b8ba4c4cb5d5000784234bfc814743
-
SHA256
e4867d9b764864ae4d9e0170d10765ead2ceb3767585c9c1a4e93080b2f32286
-
SHA512
108666d7d53041577e2edac189e8268bc819f46972ef98f78241746966ad907b1cb7dd492082c016b78d1a8c9ff916d4cca6ba01f56c648254f79cc3f21eaab7
-
SSDEEP
49152:V3AQbdYAm4zEbdYAm4zWbdYAm4z23Aw3AWbdYAm4zSbdYAm4zO3AkwUQoT7v/zh:RAadrWdr0drkAiA0dr4dr8AlUQofv/d
Score10/10-
Panda Stealer payload
-
Pandastealer family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1