MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 db09e6f69ea651370d796ee2fd4a78d9a11cd82faea3f8d5ef007c04065b1e25. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: db09e6f69ea651370d796ee2fd4a78d9a11cd82faea3f8d5ef007c04065b1e25
SHA3-384 hash: 275042d9fc205835cc39fd42713e688fcc013975388bc5c7b66812e7c2cd1df004ae0fd0f9859074dde2eccc762830f0
SHA1 hash: 8575b9c2c4c531d4f16d0671fcb7df424241e188
MD5 hash: 49513443ccc5845927cd66204f5f4e11
humanhash: nineteen-video-jig-washington
File name:pandabanker_2.5.7.vir
Download: download sample
Signature PandaZeuS
File size:176'128 bytes
First seen:2020-07-19 19:36:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f78f694ba30c48a52b36c66c70905dd6
ssdeep 3072:woeoclH7FoqvGsFDErn3YC7BFAfaWLiuiPwKnGYEQuGu/M9:KvvGsK3YC7P4UPwKnGYEQuR0
TLSH 1304C03BA5194EF6CF265FBC4AC918D97A5BB69396C7030A43F04FD289380748E5ED09
Reporter @tildedennis
Tags:pandabanker PandaZeuS


Twitter
@tildedennis
pandabanker version 2.5.7

Intelligence


File Origin
# of uploads :
1
# of downloads :
28
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Detection:
ZeusPanda
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
100 / 100
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Zuepan
Status:
Malicious
First seen:
2017-10-22 01:02:29 UTC
AV detection:
30 of 31 (96.77%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
evasion spyware persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Adds Run key to start application
Adds Run key to start application
Loads dropped DLL
Identifies Wine through registry keys
Deletes itself
Reads user/profile data of web browsers
Identifies Wine through registry keys
Reads user/profile data of web browsers
Executes dropped EXE
Executes dropped EXE
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments