General

  • Target

    JaffaCakes118_a4dbacb9093cc059417e7e5cb025c838

  • Size

    5.8MB

  • Sample

    250108-ryf66stlgx

  • MD5

    a4dbacb9093cc059417e7e5cb025c838

  • SHA1

    48ac7b81b2301790d4a8afe3cbfdaf8d54682be0

  • SHA256

    d9463ab48b318ca4c9f1b36ee3d298576b8ab7c95c7c445850a16a56bb4a6127

  • SHA512

    fc9bee0f632a63453d8980170d22151bc73bc1dd75f108b61f02d3ee7da1c31f8a387376d48a8fb9ad759efcb6657879998de6e79bbb24a7603e4624fed4c4a3

  • SSDEEP

    98304:2POtHpKFMtpFE138XQsMgWlA/1Ge9kPTaYLMbTKSfuLBk+zJ5nL7HNmS0yiEUUu0:fHpKIbrXQsMg/NqPOkMvKSSjJ5nLbNWS

Malware Config

Extracted

Family

pandastealer

Version

1.11

C2

http://f0592163.xsph.ru

Targets

    • Target

      JaffaCakes118_a4dbacb9093cc059417e7e5cb025c838

    • Size

      5.8MB

    • MD5

      a4dbacb9093cc059417e7e5cb025c838

    • SHA1

      48ac7b81b2301790d4a8afe3cbfdaf8d54682be0

    • SHA256

      d9463ab48b318ca4c9f1b36ee3d298576b8ab7c95c7c445850a16a56bb4a6127

    • SHA512

      fc9bee0f632a63453d8980170d22151bc73bc1dd75f108b61f02d3ee7da1c31f8a387376d48a8fb9ad759efcb6657879998de6e79bbb24a7603e4624fed4c4a3

    • SSDEEP

      98304:2POtHpKFMtpFE138XQsMgWlA/1Ge9kPTaYLMbTKSfuLBk+zJ5nL7HNmS0yiEUUu0:fHpKIbrXQsMg/NqPOkMvKSSjJ5nLbNWS

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Pandastealer family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks