General

  • Target

    2025-04-12_71510b548db17740339c15b6d9cac3a1_amadey_elex_smoke-loader

  • Size

    4.9MB

  • Sample

    250412-td3ksaxqs2

  • MD5

    71510b548db17740339c15b6d9cac3a1

  • SHA1

    4d6b2e39907b93caf01dd4951f4f69dab2dc10dc

  • SHA256

    def94a75a253c5fbddef0423a59f8d8fd973e1808ceb24480fe7ba809f2ad0a3

  • SHA512

    dfee37090271aba94af14c71fbf9a16aa8f6389c6a41bbeb0644eb65d5258ac46b8c432f1175fb198c91db22e37e756394a30af30c7c3091894e39c68dcbf813

  • SSDEEP

    49152:pjLuSh3i+FtvkMzT+3HfOGlk2Ph0fhMSTuy3gwxA2IICVfUcqa7mJgxKfft:BLu13/Jk2Ph05uy3Gq

Malware Config

Targets

    • Target

      2025-04-12_71510b548db17740339c15b6d9cac3a1_amadey_elex_smoke-loader

    • Size

      4.9MB

    • MD5

      71510b548db17740339c15b6d9cac3a1

    • SHA1

      4d6b2e39907b93caf01dd4951f4f69dab2dc10dc

    • SHA256

      def94a75a253c5fbddef0423a59f8d8fd973e1808ceb24480fe7ba809f2ad0a3

    • SHA512

      dfee37090271aba94af14c71fbf9a16aa8f6389c6a41bbeb0644eb65d5258ac46b8c432f1175fb198c91db22e37e756394a30af30c7c3091894e39c68dcbf813

    • SSDEEP

      49152:pjLuSh3i+FtvkMzT+3HfOGlk2Ph0fhMSTuy3gwxA2IICVfUcqa7mJgxKfft:BLu13/Jk2Ph05uy3Gq

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Pandastealer family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v16

Tasks