General

  • Target

    pandabanker_2.6.9.vir

  • Size

    210KB

  • Sample

    200719-y1bm9mjbha

  • MD5

    1ff6aa04bc4971019ecd9220847a8986

  • SHA1

    9bf32b9710a1fc088d831c0d88c6c02579ffbffa

  • SHA256

    3d95e6885d4a0a66dad5d37750fa84a4d4f1f9db2ccc741997d22d89af92cbfb

  • SHA512

    161d92bc46abe4b94d2eb1c394e2ee1530d9af7936fbbae3580f4870b8ac08db522fcf300b502350ff4dcad976e9e32c296a7c9be71964e8dfa06164bbd0a358

Malware Config

Targets

    • Target

      pandabanker_2.6.9.vir

    • Size

      210KB

    • MD5

      1ff6aa04bc4971019ecd9220847a8986

    • SHA1

      9bf32b9710a1fc088d831c0d88c6c02579ffbffa

    • SHA256

      3d95e6885d4a0a66dad5d37750fa84a4d4f1f9db2ccc741997d22d89af92cbfb

    • SHA512

      161d92bc46abe4b94d2eb1c394e2ee1530d9af7936fbbae3580f4870b8ac08db522fcf300b502350ff4dcad976e9e32c296a7c9be71964e8dfa06164bbd0a358

    • Executes dropped EXE

    • Deletes itself

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Virtualization/Sandbox Evasion

1
T1497

Collection

Data from Local System

1
T1005

Tasks