General

  • Target

    JaffaCakes118_96ca71d5635d5b0edd6ed0f716bc6928

  • Size

    1.9MB

  • Sample

    250329-yr12bs1kx7

  • MD5

    96ca71d5635d5b0edd6ed0f716bc6928

  • SHA1

    3ecd63a4d7ac4b82a04579e88121181743c281b1

  • SHA256

    e704c7f4d6181f8b15ec91a5263f8ce1d74db74cdd73490b9d167a170ad5ab37

  • SHA512

    b084a6ed4b5ae2d91688870dfb4cddf178499e2e524daf7287b207acde03b1a7cc263bc4c5d06d02f77b3d344add94e3ae148cf1f7cabd0d9fa4d380d855ba90

  • SSDEEP

    49152:FMI8WYaH+8awlUMmyVD/oskLbVt6kImhsnwuswHZ6O:F8Vh83lY6buLbSmhyV

Malware Config

Targets

    • Target

      JaffaCakes118_96ca71d5635d5b0edd6ed0f716bc6928

    • Size

      1.9MB

    • MD5

      96ca71d5635d5b0edd6ed0f716bc6928

    • SHA1

      3ecd63a4d7ac4b82a04579e88121181743c281b1

    • SHA256

      e704c7f4d6181f8b15ec91a5263f8ce1d74db74cdd73490b9d167a170ad5ab37

    • SHA512

      b084a6ed4b5ae2d91688870dfb4cddf178499e2e524daf7287b207acde03b1a7cc263bc4c5d06d02f77b3d344add94e3ae148cf1f7cabd0d9fa4d380d855ba90

    • SSDEEP

      49152:FMI8WYaH+8awlUMmyVD/oskLbVt6kImhsnwuswHZ6O:F8Vh83lY6buLbSmhyV

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Pandastealer family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks