C:\Users\Admin\Desktop\Phemedrone Stealer\Phemedrone-Stealer\obj\Release\system.pdb
Behavioral task
behavioral1
Sample
system.exe
Resource
win10v2004-20240709-en
General
-
Target
system.exe
-
Size
102KB
-
MD5
0ceb0be41ead02c760f6f7b3e64c65c0
-
SHA1
9375b6dbd0176882db2bb1b5cc37e8e97f810fc5
-
SHA256
72a5aa555bdd7de1bdc6fc47a39c50191f8ddba1f4445c0444f6f3c4e95122ec
-
SHA512
2641f11a2801d40932d2e972320d3e50a3b10c5537543dbe57cca6a22dfb0f6e5b5f1b24479d1bf9c26c9b62835a0b7c2e6ede2f41fa4facbf0cde88c6b4274c
-
SSDEEP
3072:c1y3CkjNR6+ueZ04+cZ5Q5yZ53wEKnuf:tSkj36+u94W5EK
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot7329972286:AAEOM1j7YMzqyniSmjEDT3zUq-fyt1rbFgA/sendMessage?chat_id=6732975817
Signatures
-
Phemedrone family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource system.exe
Files
-
system.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ