Analysis

  • max time kernel
    13s
  • max time network
    16s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-08-2024 20:26

General

  • Target

    MegaLoader FIXED/MEGALOADER.exe

  • Size

    115KB

  • MD5

    2e02c5ddc17eebb8ea41ac96b81931dc

  • SHA1

    0c170d5a0f8ad30c626a6744ad984a70bbbfdd15

  • SHA256

    26fd5047f1a005975c8a70b4c4f6cdd5039a614b316e07df273a29a7622e3239

  • SHA512

    74b20b94a721d26152357ff79ab7dcabf57f91f30bed47315c0b43167163d56135ef88667b8a9b99ef1f883be9c6c297020d49b1ec8d9bf083ef02c073d69776

  • SSDEEP

    1536:+8kZVfG5Pq8rGZd3RpHpc7f+W4O6eh9+5p65MKZjUue4/Xzexcwcn+lIAzYeeDsa:I7GRqPrJc7f4Tei5Ahjx4mbH

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7295635807:AAG6Je3ea3mM7v5LKExuDgA5HyvjrbUsVXs/sendDocument

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\MegaLoader FIXED\MEGALOADER.exe
    "C:\Users\Admin\AppData\Local\Temp\MegaLoader FIXED\MEGALOADER.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2868-0-0x0000000000BB0000-0x0000000000BD4000-memory.dmp

    Filesize

    144KB

  • memory/2868-1-0x00007FFD676E3000-0x00007FFD676E5000-memory.dmp

    Filesize

    8KB

  • memory/2868-2-0x00007FFD676E0000-0x00007FFD681A1000-memory.dmp

    Filesize

    10.8MB

  • memory/2868-4-0x00007FFD676E0000-0x00007FFD681A1000-memory.dmp

    Filesize

    10.8MB