Resubmissions

11-06-2024 15:13

240611-sl24js1era 10

09-06-2024 12:02

240609-n7wrfaba55 10

Analysis

  • max time kernel
    30s
  • max time network
    33s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-06-2024 12:02

General

  • Target

    Famukic.exe

  • Size

    115KB

  • MD5

    0e87127c62af8ac1acb7e31eb40b37ad

  • SHA1

    5b2720be2e4184703328de07a26fa5379ff22900

  • SHA256

    b69cfd99cea7725899e9241dac1ede0fc9e8b0aa064d782eb4b3646fede91a0a

  • SHA512

    c3d7cd3366de05f9960cfa14da7937fe0f954d3bdd2d74dc4038bde105613a36ff4f5739b78b8b5500dacbb83258519610f50359affa8dde910cc26e7e1c7a34

  • SSDEEP

    1536:5sA48yE/HZC3R5z8KFekYnCa6wbNFL5g7vVIjnGo4cqiN34OlxalC7RCYrc:aCyTXgKFek/wv5+IKNcowxwwCT

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7079797423:AAGi-EpMA7Ox2fNQaC17SmY3SzTvGbM5K_o/sendDocument

Signatures

  • Phemedrone

    An information and wallet stealer written in C#.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Famukic.exe
    "C:\Users\Admin\AppData\Local\Temp\Famukic.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/112-0-0x00007FFA05EA3000-0x00007FFA05EA5000-memory.dmp

    Filesize

    8KB

  • memory/112-1-0x0000000000130000-0x0000000000154000-memory.dmp

    Filesize

    144KB

  • memory/112-2-0x00007FFA05EA0000-0x00007FFA06961000-memory.dmp

    Filesize

    10.8MB

  • memory/112-4-0x00007FFA05EA0000-0x00007FFA06961000-memory.dmp

    Filesize

    10.8MB