Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2024 02:54
Behavioral task
behavioral1
Sample
552708c436696f90f45a1e37db90ea90N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
552708c436696f90f45a1e37db90ea90N.exe
Resource
win10v2004-20240730-en
General
-
Target
552708c436696f90f45a1e37db90ea90N.exe
-
Size
116KB
-
MD5
552708c436696f90f45a1e37db90ea90
-
SHA1
4470d1182f2587a1f9cd974e712929660234fff1
-
SHA256
24363ff2948bd9a78635471498e899306edfff82ab96d1b977a564ef2eae5b41
-
SHA512
116408995058a015137aeec14490468470dd241175b917ef16b63ab1b324e265d26db221693b4b858e43b67a57084383b0bbebe245a3ff8391aef24b57c63e85
-
SSDEEP
1536:7QEQ6Or1v0eEW32jrMP+Uo8ZPp+8y6OG60Ee5K3QC/xxx3pZzHNoriwoQAhL8j:ErnhBagZQ8HOSEe5rC/xxnZztwj
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot7206720228:AAEBZdduavQnTtKEU_zzcbsBpsX39gH7twg/sendDocument
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2184 552708c436696f90f45a1e37db90ea90N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2184 552708c436696f90f45a1e37db90ea90N.exe