General

  • Target

    pandabanker_2.6.4.vir

  • Size

    444KB

  • Sample

    200719-z7n3796t4x

  • MD5

    2f7d8654ed24dc7e0b29431ec41abbf9

  • SHA1

    5d87ef3c00ccce0885158a1029eb751b1f615b2f

  • SHA256

    68264c44774c650ce96e87807781ed0dcf25a1d50cc90e08731fde466b25c791

  • SHA512

    8d7d1321cea04db8fb8ec08f85ed9d294a5f597284099e429be44c353fadacca9780779f2f7e570b4a06877166a2b2aabb878637af7122d2d02704ede455812f

Malware Config

Targets

    • Target

      pandabanker_2.6.4.vir

    • Size

      444KB

    • MD5

      2f7d8654ed24dc7e0b29431ec41abbf9

    • SHA1

      5d87ef3c00ccce0885158a1029eb751b1f615b2f

    • SHA256

      68264c44774c650ce96e87807781ed0dcf25a1d50cc90e08731fde466b25c791

    • SHA512

      8d7d1321cea04db8fb8ec08f85ed9d294a5f597284099e429be44c353fadacca9780779f2f7e570b4a06877166a2b2aabb878637af7122d2d02704ede455812f

    • Executes dropped EXE

    • Deletes itself

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Virtualization/Sandbox Evasion

1
T1497

Collection

Data from Local System

1
T1005

Tasks