Analysis
-
max time kernel
243s -
max time network
268s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15-02-2024 13:13
Behavioral task
behavioral1
Sample
Abotihy.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Abotihy.exe
Resource
win10-20240214-en
Behavioral task
behavioral3
Sample
Abotihy.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
Abotihy.exe
Resource
win11-20240214-en
General
-
Target
Abotihy.exe
-
Size
104KB
-
MD5
a62ed6e2054cf8d2e62c02c83b3f07c7
-
SHA1
af778b353cf5d24172339d084722811c7a088668
-
SHA256
8731e05790767c76250fff12cf1ecbf497889776be13aef569cc71f0aad97039
-
SHA512
9cce378e77dfb58a0740cb07a0f951971a5a52143c1c600181286b7c9d3e0a4aa0f03b1b754d9bdb08847c22d478240ba11236fe089197081867483f45175272
-
SSDEEP
3072:1jDx+/YuqZK9WDIciaK5C0dAoz1+wEKSK0M:5ZueBoz1/EK4
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot5358754228:AAE42HAGW1bzIPxU7iVRC_96iDuHcwSjjVo/sendMessage?chat_id=5556872222
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ip-api.com -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
Abotihy.exepid process 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe 4024 Abotihy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Abotihy.exedescription pid process Token: SeDebugPrivilege 4024 Abotihy.exe