General
-
Target
loader.exe
-
Size
139KB
-
Sample
240815-cmm31svbjl
-
MD5
fb945448fb22c90d4a788494084c7f2e
-
SHA1
cd6173bd4a143ed1793fe0d305d329472bb2b70b
-
SHA256
db8721f8df446cbb083694598bef88e7a9f60dcd132a89f436a66b93fa2464b2
-
SHA512
66b1d59423fa9d79645e1a1cfa06d38907ca4d8cdad5213efffbbf8fab503724ec53fa22c1d20d13db0cca62e718bdb47f0b474f6d091ff31b5c823292993eb0
-
SSDEEP
3072:vl8ENz25WGNx23FTuHqW8hsn0kg0+T77qCGKLhN8IxX56Ez:dhNz28GNU3JAh8h60kpM72ohNRxYE
Static task
static1
Behavioral task
behavioral1
Sample
loader.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
loader.exe
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
loader.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
loader.exe
Resource
win11-20240802-en
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot7253527125:AAG2zbXlkuY33BxLSZk2mcohhToET22xkTM/sendDocument
Targets
-
-
Target
loader.exe
-
Size
139KB
-
MD5
fb945448fb22c90d4a788494084c7f2e
-
SHA1
cd6173bd4a143ed1793fe0d305d329472bb2b70b
-
SHA256
db8721f8df446cbb083694598bef88e7a9f60dcd132a89f436a66b93fa2464b2
-
SHA512
66b1d59423fa9d79645e1a1cfa06d38907ca4d8cdad5213efffbbf8fab503724ec53fa22c1d20d13db0cca62e718bdb47f0b474f6d091ff31b5c823292993eb0
-
SSDEEP
3072:vl8ENz25WGNx23FTuHqW8hsn0kg0+T77qCGKLhN8IxX56Ez:dhNz28GNU3JAh8h60kpM72ohNRxYE
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3