Analysis
-
max time kernel
30s -
max time network
41s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 15:47
Behavioral task
behavioral1
Sample
Iguduvu.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Iguduvu.exe
Resource
win10v2004-20240704-en
General
-
Target
Iguduvu.exe
-
Size
115KB
-
MD5
d6dbf35249ae335417b2a86f7bc41db5
-
SHA1
37bd62f70e66087b0ac7b46fee343f25bde8534d
-
SHA256
f17e66a90dfa250f34f0d8fe42e57911a348b6adc08b13db3765e2259a051b62
-
SHA512
ed952bd9c21331a60729fd8b5759fb57a5db56ba02f2db8fe905a3166e88d2b7dbd6cae9a368fd250ba1c3afdc5dfbcb6b46f5983ed011d869ed3c848405207e
-
SSDEEP
1536:F0vTeZhDyUJZi3RFKfbNjKQauE7+z6WksjD15aE8Te/rC/SZpcAdpiXCsMx+VSFb:qv6ZheLsbN5bEHWko15aROrA6RoM
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot7383063637:AAFyD9g219vkZhknsRfJlso3402h_1hs7xE/sendDocument
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Iguduvu.exedescription pid process Token: SeDebugPrivilege 3048 Iguduvu.exe