General
-
Target
pandabanker_2.1.1.vir
-
Size
308KB
-
Sample
200719-tly34e679s
-
MD5
ed09632e3d549edb8f31eaac5562df7c
-
SHA1
d78f465ffb433d4f2c9382e22e028709567c7eba
-
SHA256
62989ab56f11701b109cddf0eb20e995c833078bb40942a8c931589497c25948
-
SHA512
5a4fd769e5eafd76704eff6138eb25637353bdd4e23c769f327f76e2e3dad6cbae06ce7090b88b1d6802e7dfd94639b4316334435fdc2b4efc8f13226e176e2b
Static task
static1
Behavioral task
behavioral1
Sample
pandabanker_2.1.1.vir.exe
Resource
win7
Behavioral task
behavioral2
Sample
pandabanker_2.1.1.vir.exe
Resource
win10
Malware Config
Targets
-
-
Target
pandabanker_2.1.1.vir
-
Size
308KB
-
MD5
ed09632e3d549edb8f31eaac5562df7c
-
SHA1
d78f465ffb433d4f2c9382e22e028709567c7eba
-
SHA256
62989ab56f11701b109cddf0eb20e995c833078bb40942a8c931589497c25948
-
SHA512
5a4fd769e5eafd76704eff6138eb25637353bdd4e23c769f327f76e2e3dad6cbae06ce7090b88b1d6802e7dfd94639b4316334435fdc2b4efc8f13226e176e2b
Score8/10-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-