Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 17:24
Behavioral task
behavioral1
Sample
Elicyda.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Elicyda.exe
Resource
win10v2004-20240704-en
General
-
Target
Elicyda.exe
-
Size
111KB
-
MD5
44fa4c011697e2dc2d149219a9949740
-
SHA1
7925497efd9ef5ac7e859d50e5861e690f4d7c4f
-
SHA256
8de76539d6d64228ae987107ab718b82bb93c163e42235402f96a48f26c49ce4
-
SHA512
165f88076246bb671c8556f2cf5e74570d0c4728ac65305cd936e7480c0739fab9e77f7a152f5a639ef6c18af50c982fce4dd132c72f78f0d1e6b6052367296f
-
SSDEEP
1536:l6JUfYrWajy6Ps/NLgxgkRb5rZn65lYC1IBKOkBs1OnsUgSOpWEfMF:OUTajyUCtKgq5c5l11IBKOSsQ9
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot6861530662:AAFueJRxaIZGz_oVT2-CVuuL9N0MRsh-5_Y/sendDocument
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
Elicyda.exepid process 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe 3332 Elicyda.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Elicyda.exedescription pid process Token: SeDebugPrivilege 3332 Elicyda.exe