Malware Analysis Report

2025-01-02 15:33

Sample ID 241205-d7qkbasqgm
Target f1eb7e3402cc00656efa4c5c664ff364106a93b0d75162b49aedaea23f8834ad.exe
SHA256 f1eb7e3402cc00656efa4c5c664ff364106a93b0d75162b49aedaea23f8834ad
Tags
pandastealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f1eb7e3402cc00656efa4c5c664ff364106a93b0d75162b49aedaea23f8834ad

Threat Level: Known bad

The file f1eb7e3402cc00656efa4c5c664ff364106a93b0d75162b49aedaea23f8834ad.exe was found to be: Known bad.

Malicious Activity Summary

pandastealer

Panda Stealer payload

Pandastealer family

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-12-05 03:39

Signatures

Panda Stealer payload

Description Indicator Process Target
N/A N/A N/A N/A

Pandastealer family

pandastealer

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-05 03:39

Reported

2024-12-05 03:39

Platform

win7-20241010-en

Max time kernel

0s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-05 03:39

Reported

2024-12-05 03:39

Platform

win10v2004-20241007-en

Max time kernel

0s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 8.8.8.8:53 udp
N/A 52.191.219.104:443 tcp

Files

N/A