Analysis
-
max time kernel
190s -
max time network
297s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
25-07-2024 23:27
Behavioral task
behavioral1
Sample
Xevupym.exe
Resource
win10-20240611-en
General
-
Target
Xevupym.exe
-
Size
95KB
-
MD5
9e1c25aa4eb36a1657af47408c207e99
-
SHA1
fb820ddc49ffe6c2e685a02134b9df828c8bbf53
-
SHA256
c6e07d0fcd8eeb4a773ab3e70d4a6b01cb82102fa5f8f7488ebcf59d56e7a65b
-
SHA512
b2137d0f3cfa288c317fc1a6e912f64e7c115a86ac9a666a1c565f62902f59338bee38dace8c0a9f1758b390f7af69dfbf92827156b50f04e7ad8909d482eb83
-
SSDEEP
1536:iEjPTgYjn9dcwqjhhJr7bNTANOVMO557KIOzsBuBjqoZ9EJSDgICOAfefChpyk:iyTgYjn9dcwqjceB557xOw/m9GSsICAi
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot7486088921:AAFsIyc8IlSP_oRKI-pT-_y6GEUTpF4NVC4/sendDocument
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
Xevupym.exepid process 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe 2148 Xevupym.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Xevupym.exedescription pid process Token: SeDebugPrivilege 2148 Xevupym.exe