General

  • Target

    pandabanker_2.2.14.vir

  • Size

    386KB

  • Sample

    200719-9qe61psxde

  • MD5

    3453925306c0f929dc8d2ae529cac793

  • SHA1

    9bd2acbaa355e5bab33e0e8a112a24da3e623f19

  • SHA256

    e8012d5c00deb0a3684d7767de19e4dea2ff536060fe5671393252152b0b1d8f

  • SHA512

    57e0b40d6f0584dc72b7a5bed7966ee2d7114e33c4284a92f1af70b4a99e9630b02fbddc58c066eb05b809c9d3905d0101242bd73eb49987f4eb967b21bfe957

Score
9/10

Malware Config

Targets

    • Target

      pandabanker_2.2.14.vir

    • Size

      386KB

    • MD5

      3453925306c0f929dc8d2ae529cac793

    • SHA1

      9bd2acbaa355e5bab33e0e8a112a24da3e623f19

    • SHA256

      e8012d5c00deb0a3684d7767de19e4dea2ff536060fe5671393252152b0b1d8f

    • SHA512

      57e0b40d6f0584dc72b7a5bed7966ee2d7114e33c4284a92f1af70b4a99e9630b02fbddc58c066eb05b809c9d3905d0101242bd73eb49987f4eb967b21bfe957

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Executes dropped EXE

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

4
T1497

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

4
T1497

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks