General

  • Target

    ccec9f6516e38c852b1df13c836e5430.bin

  • Size

    3.0MB

  • Sample

    231006-cwy7msgf8v

  • MD5

    1115ff813afcf5ec145826d51a249158

  • SHA1

    795bb247347a7b8713b62e17cea60c0c4a35f5be

  • SHA256

    4b1d253b214f9d502bcb88d8df24424c1c11692cba770031cca6c7d3703d19de

  • SHA512

    80755ed09708816101d6f19c0cdd5df9acdde7a84ee05f663063c5cfb6ca5e06af20409a1764a74ce3be16363d99a53608d642dd4805441b8b043c878f6bb03d

  • SSDEEP

    49152:M7s/8jHGDVX2D0BDrsR0fn1aVsyoV79XrialhnkHrZisJuXqut9ORNRdxJld3AH:MFScR8OsyI9eUhkL146utArdPAH

Malware Config

Targets

    • Target

      e5e92ec5d1d5be22b05694956de0321475105789279acbc9e83d7796026ec385.exe

    • Size

      6.7MB

    • MD5

      ccec9f6516e38c852b1df13c836e5430

    • SHA1

      30e3c298370f32e92d42f586e170996229db8fab

    • SHA256

      e5e92ec5d1d5be22b05694956de0321475105789279acbc9e83d7796026ec385

    • SHA512

      e23d714a352ebda1c75ade3f782159562d34402ebff31511f5b952b247f9b49c039a4b29123762bbffcbe90f3dd6db828bc36deac344a91d75f41346435bbdd1

    • SSDEEP

      49152:Fu9q0pxgIYZdVKr2TZO/Ay+tN2ACtcXrGwuh0637dkKg4kGzlXerAEEEEEEEEE20:

    • Phemedrone

      An information and wallet stealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks