General

  • Target

    NEAS.e74b8c7dfcf9ccf4cce06b7481bc06c0.exe

  • Size

    4.9MB

  • Sample

    231115-fcva5acc54

  • MD5

    e74b8c7dfcf9ccf4cce06b7481bc06c0

  • SHA1

    c1b3d72fb4b04462d894e5478ea1da26af0932c6

  • SHA256

    976ab5ad4822144756c44ce8fb0426f62e26d9d579d0cb5211c1701be681e775

  • SHA512

    7dad6ebde32bb186dda82c8efda7f46dc2523ac4180f78c9368c0d35eb757b48525dbcf5f65c42f38a42f3253fcee7246646075e22a3ef4a1a6e64b769e875ef

  • SSDEEP

    98304:usadS1IAMpZL6DZ4x0z5vzg2ObHhpfkKmCNHBANF1bkzTtwOUcO:u/ZAaMxZZiBeCNHyzbklwOUcO

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot6526296839:AAHf93IZJTXM1F9tUJGQR-zriuV-RU7enBM/sendMessage?chat_id=872309541

Targets

    • Target

      NEAS.e74b8c7dfcf9ccf4cce06b7481bc06c0.exe

    • Size

      4.9MB

    • MD5

      e74b8c7dfcf9ccf4cce06b7481bc06c0

    • SHA1

      c1b3d72fb4b04462d894e5478ea1da26af0932c6

    • SHA256

      976ab5ad4822144756c44ce8fb0426f62e26d9d579d0cb5211c1701be681e775

    • SHA512

      7dad6ebde32bb186dda82c8efda7f46dc2523ac4180f78c9368c0d35eb757b48525dbcf5f65c42f38a42f3253fcee7246646075e22a3ef4a1a6e64b769e875ef

    • SSDEEP

      98304:usadS1IAMpZL6DZ4x0z5vzg2ObHhpfkKmCNHBANF1bkzTtwOUcO:u/ZAaMxZZiBeCNHyzbklwOUcO

    • Phemedrone

      An information and wallet stealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks