top title background image
flash

pandabanker_2.6.7.exe

Status: finished
Submission Time: 2020-07-19 21:52:57 +02:00
Malicious
Phishing
E-Banking Trojan
Spyware
Evader
Panda

Comments

Tags

  • pandabanker

Details

  • Analysis ID:
    247702
  • API (Web) ID:
    390702
  • Analysis Started:
    2020-07-20 13:19:13 +02:00
  • Analysis Finished:
    2020-07-20 13:27:07 +02:00
  • MD5:
    2526818feedf1748fa0de8ee290ad9ee
  • SHA1:
    cd67a0ebd40d88d6d2f9b8df9b9c729479dad4f6
  • SHA256:
    41ac9dd172ebc186c77cab9f12401ab18805e77c34eacdf9dfdbd570d8bd9c62
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 62/72
malicious
Score: 28/39
malicious
Score: 30/31
malicious

Domains

Name IP Detection
wrentweak.top
0.0.0.0

URLs

Name Detection
https://wrentweak.top/utUhexJXE/q/bfwasEzlWeF/wKi/t04-ej/Q/
https://wrentweak.top/utUhexJXE/q/bfwasEzlWeF/wKi/t04-ej/Q/;
https://wrentweak.top/1lateovahuqesmyylkiin.datBD
Click to see the 1 hidden entries
https://wrentweak.top/1lateovahuqesmyylkiin.dat

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\upd452d24b2.bat
DOS batch file, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\previous.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\6c4zjj0s.default\prefs.js
ASCII text, with very long lines, with CRLF line terminators
#
Click to see the 1 hidden entries
C:\Users\user\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Jul 17 16:22:48 2018, mtime=Wed Nov 21 21:19:52 2 (…)
#