MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 db790cbe0beb2a9c2749cb914fbdec8bdc7aa2ef3c9ca6c721e0c0fede715fb2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: db790cbe0beb2a9c2749cb914fbdec8bdc7aa2ef3c9ca6c721e0c0fede715fb2
SHA3-384 hash: 7e9e4cf2cce74619110cd68caba14c2268f8499b81d45849b1ff19b8c1b9e14efca6c0d56c9c7b763111945ed3a6ab09
SHA1 hash: cb92588544d6a12f61b66f0694b60a5cacfd4684
MD5 hash: c6ffa4a58e659e537868350abd676ba0
humanhash: fish-october-colorado-rugby
File name:pandabanker_2.1.0.vir
Download: download sample
Signature PandaZeuS
File size:248'832 bytes
First seen:2020-07-19 19:31:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b4b4863e8cecbfba9229990eda3b5ca4
ssdeep 1536:gvV0O69PIxnzVVYl8A0uV7yYqgfAu4xRal34aZXAq2D0Ip:gvAKBVY+A0w2YeuoaNRZXAq2x
TLSH E434F12B78F155B6CECD187A14A3583DAE735901BB64CE24C50E072E4B3369AF907A2D
Reporter @tildedennis
Tags:pandabanker


Twitter
@tildedennis
pandabanker version 2.1.0

Intelligence


File Origin
# of uploads :
1
# of downloads :
27
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Detection:
ZeusPanda
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
60 / 100
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Demp
Status:
Malicious
First seen:
2016-01-27 01:06:00 UTC
AV detection:
25 of 31 (80.65%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Loads dropped DLL
Deletes itself
Reads user/profile data of web browsers
Executes dropped EXE
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments