Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2023 18:49
Behavioral task
behavioral1
Sample
Iputeny.exe
Resource
win10v2004-20231025-en
General
-
Target
Iputeny.exe
-
Size
84KB
-
MD5
2eae4fc3c124605b2338b611578edf2f
-
SHA1
664bb5841207c075ecc6c82943b6e54d0295bcf2
-
SHA256
64503745802796c734b5c3b6e62a5ba2b40fde46fe5a3ea1e8f7b37b49b2df92
-
SHA512
af615e1346bad0f6fe907dcd7f7f9f184c302440f94b3cde103979a171d84ec753852d6054f9d7e294563dd6bfd7c5b4e5388203183703e5760fa68927f03bfd
-
SSDEEP
1536:e49Lu+af58EPGTtZln8WKSO5T3rZ/SwEKSK99jzpme:e49uf5/PsjntS5TbZKwEKSK99jVL
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot6869946861:AAFp2CTwZLT6Luum35cQR_IF-4kGxK5jIYM/sendMessage?chat_id=6919564136
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 ip-api.com -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
Iputeny.exepid process 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe 3940 Iputeny.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Iputeny.exedescription pid process Token: SeDebugPrivilege 3940 Iputeny.exe