Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-03-2024 18:52

General

  • Target

    c69fd0703f716a3ec58ebbbaa6175c2ef08e99776bfee8d605239e62cd39ca19.exe

  • Size

    1.0MB

  • MD5

    dc3359eda52260d89b74d9c19298bfa3

  • SHA1

    98dcb4707dc445ca841fe227a2bde05319a7f7a9

  • SHA256

    c69fd0703f716a3ec58ebbbaa6175c2ef08e99776bfee8d605239e62cd39ca19

  • SHA512

    101dfebc389e85c51cf2dfcdbda69392ad90d092528ee8367af20ed3df1e2a5f315e7e69ee4515c9d1c06328c88b8337fa6137eede96fb423e838e6e3c1bba7b

  • SSDEEP

    24576:kuj4qM9299CTg9CXCqDPrjKQ0nk5DBGVpD5XWmAZ4KWfM4Uh:k8o9Y0Tg9CSqDPrjKlnk5D4Vp4h

Score
10/10

Malware Config

Signatures

  • Panda Stealer payload 2 IoCs
  • PandaStealer

    Panda Stealer is a fork of CollectorProject Stealer written in C++.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c69fd0703f716a3ec58ebbbaa6175c2ef08e99776bfee8d605239e62cd39ca19.exe
    "C:\Users\Admin\AppData\Local\Temp\c69fd0703f716a3ec58ebbbaa6175c2ef08e99776bfee8d605239e62cd39ca19.exe"
    1⤵
      PID:3828

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3828-0-0x0000000000400000-0x00000000004E9000-memory.dmp
      Filesize

      932KB

    • memory/3828-1-0x0000000076F32000-0x0000000076F33000-memory.dmp
      Filesize

      4KB

    • memory/3828-2-0x0000000076F33000-0x0000000076F34000-memory.dmp
      Filesize

      4KB

    • memory/3828-3-0x0000000000400000-0x00000000004E9000-memory.dmp
      Filesize

      932KB