General

  • Target

    400471a357266923af7b64048acd77f3d132dd429c3ef8eae4ab5dfd6652fd39.exe

  • Size

    313KB

  • MD5

    accf109edfa6ea05bb88505668ad8e28

  • SHA1

    d3cb874e0db864d16b90a5a6ecac2651b2fc5c41

  • SHA256

    400471a357266923af7b64048acd77f3d132dd429c3ef8eae4ab5dfd6652fd39

  • SHA512

    7a63951e9baba219769e1186c126dfe2fee5d8fc9e46000add310fb1e432118017b43cebff926e095da3a67b134307260024f02d9d055856268db407568287e7

  • SSDEEP

    6144:kfdmxcbEKy9TVUfUnBfrmjlyRVLkJqJVpHO5CZ7Rm:kfdShVBfrmjsN/pf7Rm

Score
10/10

Malware Config

Extracted

Family

phemedrone

C2

https://rakishevkenes.com/wp-admin/admin-ajax.php

Signatures

  • Detect binaries embedding considerable number of MFA browser extension IDs. 1 IoCs
  • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 1 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
  • Phemedrone family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 400471a357266923af7b64048acd77f3d132dd429c3ef8eae4ab5dfd6652fd39.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections