MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e4e8aac2107834b2d895fc35d71bb396075d971c650ff173714c3d17956c7da6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara 3 Comments

SHA256 hash: e4e8aac2107834b2d895fc35d71bb396075d971c650ff173714c3d17956c7da6
SHA3-384 hash: 2b6a428881ae22f43fe6bc11bb20094ed751658b0e7ff5c88aed9c28e6b0f6c4822159630c68ca3b370c08745e4c7594
SHA1 hash: ab94e10047ee84e26263fa4c1528295b3c9ef945
MD5 hash: dfb9784c77e51bfb53d018b7b64381ff
humanhash: mike-july-echo-double
File name:pandabanker_2.1.2.vir
Download: download sample
Signature ZeuS
File size:344'576 bytes
First seen:2020-07-19 19:40:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 19f69ce46c11a6a3bbc6f2465ff71c5f
ssdeep 6144:M2lv3bUB1QrKur9QIlbbBcIZTBl8fI+nKAbIG:M8v3bUPsNZTBl4I/PG
TLSH 5874AEDE72A384F2DC12D6343C0697900E695CF7F33B43DA6A887D2A59B125711EA1CE
Reporter @tildedennis
Tags:pandabanker ZeuS


Twitter
@tildedennis
pandabanker version 2.1.2

Intelligence


File Origin
# of uploads :
1
# of downloads :
29
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Detection:
ZeusPanda
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Threat name:
Win32.Trojan.Yakes
Status:
Malicious
First seen:
2016-03-03 08:01:13 UTC
AV detection:
45 of 47 (95.74%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
JavaScript code in executable
Threat name:
Unknown
Score:
1.00

Yara Signatures


Rule name:win_pandabanker_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_pandabanker_g0
Author:slavo/mak
Rule name:Zeus_Panda
Author:Florian Roth
Description:Detects ZEUS Panda Malware
Reference:https://cyberwtf.files.wordpress.com/2017/07/panda-whitepaper.pdf

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments