General
-
Target
geek.exe
-
Size
6.7MB
-
Sample
241210-rbkabaslgq
-
MD5
ef78997488e6121971404a3f25686fee
-
SHA1
53a260990106e5271cb525f87be008e299beaa85
-
SHA256
d96df1051e62aa40baefd51235be45f8038745582a5d3428b63123fd2ced60db
-
SHA512
8a021950ae41a76659cacdba57d4a090b839dc9a39866b1ca3b6efc533d2542cdb40dbf5004c58d1793329a60126052d7372b0b3d4e9165cfa48938f0e77e573
-
SSDEEP
98304:jo2mCHer41qIJVUR0LRn2ufOFL//bHAKYmg77UQ1mfa/ews4VOp9mD:U4wIY0LRnHfq37g7oQcfa/ewsWOpsD
Static task
static1
Behavioral task
behavioral1
Sample
geek.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
geek.exe
-
Size
6.7MB
-
MD5
ef78997488e6121971404a3f25686fee
-
SHA1
53a260990106e5271cb525f87be008e299beaa85
-
SHA256
d96df1051e62aa40baefd51235be45f8038745582a5d3428b63123fd2ced60db
-
SHA512
8a021950ae41a76659cacdba57d4a090b839dc9a39866b1ca3b6efc533d2542cdb40dbf5004c58d1793329a60126052d7372b0b3d4e9165cfa48938f0e77e573
-
SSDEEP
98304:jo2mCHer41qIJVUR0LRn2ufOFL//bHAKYmg77UQ1mfa/ews4VOp9mD:U4wIY0LRnHfq37g7oQcfa/ewsWOpsD
-
Panda Stealer payload
-
Pandastealer family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1