Analysis
-
max time kernel
13s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 20:26
Behavioral task
behavioral1
Sample
MegaLoader FIXED/MEGALOADER.exe
Resource
win10v2004-20240802-en
General
-
Target
MegaLoader FIXED/MEGALOADER.exe
-
Size
115KB
-
MD5
2e02c5ddc17eebb8ea41ac96b81931dc
-
SHA1
0c170d5a0f8ad30c626a6744ad984a70bbbfdd15
-
SHA256
26fd5047f1a005975c8a70b4c4f6cdd5039a614b316e07df273a29a7622e3239
-
SHA512
74b20b94a721d26152357ff79ab7dcabf57f91f30bed47315c0b43167163d56135ef88667b8a9b99ef1f883be9c6c297020d49b1ec8d9bf083ef02c073d69776
-
SSDEEP
1536:+8kZVfG5Pq8rGZd3RpHpc7f+W4O6eh9+5p65MKZjUue4/Xzexcwcn+lIAzYeeDsa:I7GRqPrJc7f4Tei5Ahjx4mbH
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot7295635807:AAG6Je3ea3mM7v5LKExuDgA5HyvjrbUsVXs/sendDocument
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MEGALOADER.exedescription pid process Token: SeDebugPrivilege 2868 MEGALOADER.exe