Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Zeus Panda

Zeus Panda

Zeus Panda is a Trojan designed to steal banking information and other sensitive credentials for exfiltration.Zeus Panda’s original source code was leaked in 2011, allowing threat actors to use its source code as a basis for new malware variants. It is mainly used to target Windows operating systems ranging from Windows XP through Windows 10.[1][2]

ID: S0330
Type: MALWARE
Platforms: Windows
Version: 1.4
Created: 29 January 2019
Last Modified: 10 April 2024
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

Zeus Panda uses HTTP for C2 communications.[1]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Zeus Panda adds persistence by creating Registry Run keys.[1][2]

EnterpriseT1115Clipboard Data

Zeus Panda can hook GetClipboardData function to watch for clipboard pastes to collect.[2]

EnterpriseT1059Command and Scripting Interpreter

Zeus Panda can launch remote scripts on the victim’s machine.[2]

.001PowerShell

Zeus Panda uses PowerShell to download and execute the payload.[1]

.003Windows Command Shell

Zeus Panda can launch an interface where it can execute several commands on the victim’s PC.[2]

EnterpriseT1140Deobfuscate/Decode Files or Information

Zeus Panda decrypts strings in the code during the execution process.[1]

EnterpriseT1083File and Directory Discovery

Zeus Panda searches for specific directories on the victim’s machine.[2]

EnterpriseT1070.004Indicator Removal:File Deletion

Zeus Panda has a command to delete a file. It also can uninstall scripts and delete files to cover its track.[2]

EnterpriseT1105Ingress Tool Transfer

Zeus Panda can download additional malware plug-in modules and execute them on the victim’s machine.[2]

EnterpriseT1056.001Input Capture:Keylogging

Zeus Panda can perform keylogging on the victim’s machine by hooking the functions TranslateMessage and WM_KEYDOWN.[2]

.004Input Capture:Credential API Hooking

Zeus Panda hooks processes by leveraging its own IAT hooked functions.[2]

EnterpriseT1112Modify Registry

Zeus Panda modifies several Registry keys underHKCU\Software\Microsoft\Internet Explorer\ PhishingFilter\ to disable phishing filters.[2]

EnterpriseT1027.010Obfuscated Files or Information:Command Obfuscation

Zeus Panda obfuscates the macro commands in its initial payload.[1]

.013Obfuscated Files or Information:Encrypted/Encoded File

Zeus Panda encrypts strings with XOR.Zeus Panda also encrypts all configuration and settings in AES and RC4.[1][2]

EnterpriseT1057Process Discovery

Zeus Panda checks for running processes on the victim’s machine.[2]

EnterpriseT1055.002Process Injection:Portable Executable Injection

Zeus Panda checks processes on the system and if they meet the necessary requirements, it injects into that process.[2]

EnterpriseT1012Query Registry

Zeus Panda checks for the existence of a Registry key and if it contains certain values.[2]

EnterpriseT1113Screen Capture

Zeus Panda can take screenshots of the victim’s machine.[2]

EnterpriseT1518.001Software Discovery:Security Software Discovery

Zeus Panda checks to see if anti-virus, anti-spyware, or firewall products are installed in the victim’s environment.[1][2]

EnterpriseT1082System Information Discovery

Zeus Panda collects the OS version, system architecture, computer name, product ID, install date, and information on the keyboard mapping to determine the language used on the system.[1][2]

EnterpriseT1614.001System Location Discovery:System Language Discovery

Zeus Panda queries the system's keyboard mapping to determine the language used on the system. It will terminate execution if it detects LANG_RUSSIAN, LANG_BELARUSIAN, LANG_KAZAK, or LANG_UKRAINIAN.[1]

EnterpriseT1124System Time Discovery

Zeus Panda collects the current system time (UTC) and sends it back to the C2 server.[2]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp