General

  • Target

    GPOscript.rar

  • Size

    315KB

  • Sample

    250323-txzcgawygs

  • MD5

    b8f11fd5f47feb29d3390fbcbfb8f8a8

  • SHA1

    a7d1abebf611c6b1df507df045bc09d5defa2235

  • SHA256

    a55a1fb322306d1e3052574c5539b2b4ac93a28f4baee165fcc7b0c5facc0d23

  • SHA512

    786f36b09385845e43f38e036693bcef6b19aab6b8b9c453f011fd99dc97f2927fe67ffb44797f3f66c999ccf0f9a84c33f4e4f42f87a1cb97d069d174b7f57a

  • SSDEEP

    6144:F9aQ54JfOXFCEI0mnidW/rnQJYbjNUTYjIVs2X4DDM0GojCkp+gdiCLa:m044VMKEjnFbj+TWIVs2IDWQhoCa

Malware Config

Targets

    • Target

      GPOscript.rar

    • Size

      315KB

    • MD5

      b8f11fd5f47feb29d3390fbcbfb8f8a8

    • SHA1

      a7d1abebf611c6b1df507df045bc09d5defa2235

    • SHA256

      a55a1fb322306d1e3052574c5539b2b4ac93a28f4baee165fcc7b0c5facc0d23

    • SHA512

      786f36b09385845e43f38e036693bcef6b19aab6b8b9c453f011fd99dc97f2927fe67ffb44797f3f66c999ccf0f9a84c33f4e4f42f87a1cb97d069d174b7f57a

    • SSDEEP

      6144:F9aQ54JfOXFCEI0mnidW/rnQJYbjNUTYjIVs2X4DDM0GojCkp+gdiCLa:m044VMKEjnFbj+TWIVs2IDWQhoCa

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Pandastealer family

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.