General

  • Target

    Xevupym.exe

  • Size

    95KB

  • Sample

    240725-3frqqssakn

  • MD5

    9e1c25aa4eb36a1657af47408c207e99

  • SHA1

    fb820ddc49ffe6c2e685a02134b9df828c8bbf53

  • SHA256

    c6e07d0fcd8eeb4a773ab3e70d4a6b01cb82102fa5f8f7488ebcf59d56e7a65b

  • SHA512

    b2137d0f3cfa288c317fc1a6e912f64e7c115a86ac9a666a1c565f62902f59338bee38dace8c0a9f1758b390f7af69dfbf92827156b50f04e7ad8909d482eb83

  • SSDEEP

    1536:iEjPTgYjn9dcwqjhhJr7bNTANOVMO557KIOzsBuBjqoZ9EJSDgICOAfefChpyk:iyTgYjn9dcwqjceB557xOw/m9GSsICAi

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7486088921:AAFsIyc8IlSP_oRKI-pT-_y6GEUTpF4NVC4/sendDocument

Targets

    • Target

      Xevupym.exe

    • Size

      95KB

    • MD5

      9e1c25aa4eb36a1657af47408c207e99

    • SHA1

      fb820ddc49ffe6c2e685a02134b9df828c8bbf53

    • SHA256

      c6e07d0fcd8eeb4a773ab3e70d4a6b01cb82102fa5f8f7488ebcf59d56e7a65b

    • SHA512

      b2137d0f3cfa288c317fc1a6e912f64e7c115a86ac9a666a1c565f62902f59338bee38dace8c0a9f1758b390f7af69dfbf92827156b50f04e7ad8909d482eb83

    • SSDEEP

      1536:iEjPTgYjn9dcwqjhhJr7bNTANOVMO557KIOzsBuBjqoZ9EJSDgICOAfefChpyk:iyTgYjn9dcwqjceB557xOw/m9GSsICAi

    • Phemedrone

      An information and wallet stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks