Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 15:13
Behavioral task
behavioral1
Sample
Famukic.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Famukic.exe
Resource
win10v2004-20240508-en
General
-
Target
Famukic.exe
-
Size
115KB
-
MD5
0e87127c62af8ac1acb7e31eb40b37ad
-
SHA1
5b2720be2e4184703328de07a26fa5379ff22900
-
SHA256
b69cfd99cea7725899e9241dac1ede0fc9e8b0aa064d782eb4b3646fede91a0a
-
SHA512
c3d7cd3366de05f9960cfa14da7937fe0f954d3bdd2d74dc4038bde105613a36ff4f5739b78b8b5500dacbb83258519610f50359affa8dde910cc26e7e1c7a34
-
SSDEEP
1536:5sA48yE/HZC3R5z8KFekYnCa6wbNFL5g7vVIjnGo4cqiN34OlxalC7RCYrc:aCyTXgKFek/wv5+IKNcowxwwCT
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot7079797423:AAGi-EpMA7Ox2fNQaC17SmY3SzTvGbM5K_o/sendDocument
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2532 2036 Famukic.exe 29 PID 2036 wrote to memory of 2532 2036 Famukic.exe 29 PID 2036 wrote to memory of 2532 2036 Famukic.exe 29