General

  • Target

    pandabanker_2.3.2.vir

  • Size

    347KB

  • Sample

    200719-97cjgbdfhe

  • MD5

    ff044656b81afc0b8096bacb070277bf

  • SHA1

    5e8dd2c875da5af0958bc38593ace12e68090c81

  • SHA256

    59e2125782c015d9cad7ae6035eaed1cfab4889ee90ed74888582c784d08fb3b

  • SHA512

    68c5a083529ff046ff826d3dcc34360dabbf74aeab9d19a39b7026ceb19b1a2836fbfb9bb7fab8eab3040bf5fa7cf33cb7865d472a19dcc4200d6a4d2d16c059

Score
9/10

Malware Config

Targets

    • Target

      pandabanker_2.3.2.vir

    • Size

      347KB

    • MD5

      ff044656b81afc0b8096bacb070277bf

    • SHA1

      5e8dd2c875da5af0958bc38593ace12e68090c81

    • SHA256

      59e2125782c015d9cad7ae6035eaed1cfab4889ee90ed74888582c784d08fb3b

    • SHA512

      68c5a083529ff046ff826d3dcc34360dabbf74aeab9d19a39b7026ceb19b1a2836fbfb9bb7fab8eab3040bf5fa7cf33cb7865d472a19dcc4200d6a4d2d16c059

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Executes dropped EXE

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

4
T1497

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

4
T1497

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks