General

  • Target

    pandabanker_2.5.1.vir

  • Size

    98KB

  • Sample

    200719-7smedd1abj

  • MD5

    203ec0eda28e1fa47e784adeb312f1b7

  • SHA1

    77170d35b865b04ccb7e22f7814c594ccc205827

  • SHA256

    31ed064712da1c70c11c2e157e8469812befb3f051dcd7ffa4de44be49860381

  • SHA512

    f329d53df91985fc551e761d6d5807a802d755a0d1b86d127caf621f5f62b6976645cb9193e7d673a1e3141253e7cfa45cb1f025d30cfee509d0ccc6648a8645

Malware Config

Targets

    • Target

      pandabanker_2.5.1.vir

    • Size

      98KB

    • MD5

      203ec0eda28e1fa47e784adeb312f1b7

    • SHA1

      77170d35b865b04ccb7e22f7814c594ccc205827

    • SHA256

      31ed064712da1c70c11c2e157e8469812befb3f051dcd7ffa4de44be49860381

    • SHA512

      f329d53df91985fc551e761d6d5807a802d755a0d1b86d127caf621f5f62b6976645cb9193e7d673a1e3141253e7cfa45cb1f025d30cfee509d0ccc6648a8645

    • Executes dropped EXE

    • Deletes itself

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Virtualization/Sandbox Evasion

1
T1497

Collection

Data from Local System

1
T1005

Tasks