General

  • Target

    19487407331.zip

  • Size

    57KB

  • Sample

    241018-anag7svdrd

  • MD5

    936817dfec6d50527f98309fd3939d14

  • SHA1

    c0991e8209043cccd1a15089153413b101b809c3

  • SHA256

    190675e9d7fe6a7b38f5d5e1780dbfdb28e4394afa3b0366a4bcfb1291cdfe1d

  • SHA512

    39aca5c3d2121f3fe9d62964fcff9b1671d8b96d6b44de74fff7eb0c1b96bbd7bfe952d89a8b0311c8b773e2ed3d8c18585376d30ac4c20eb5e45670a34cc1d2

  • SSDEEP

    1536:vx7KzPeEHsG3lmfwRgil7D6NWtiq0zoJ9afxhSFV2lc:xa2tG1mvil6c4L9fOFoy

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7497338331:AAEJGEIPkQdHc_37msPzyi9qbnEG1SgWnyg/sendDocument

Targets

    • Target

      8415f13b0232d073f4aa9e345407260998e5b7b10b4800fc34d064d77dd140f3

    • Size

      121KB

    • MD5

      76ef38ee937aa1ef2df23df19508d581

    • SHA1

      00de8455bf072874c351883522269c0bfbe973cc

    • SHA256

      8415f13b0232d073f4aa9e345407260998e5b7b10b4800fc34d064d77dd140f3

    • SHA512

      cfbf32c631a472f1200cf7d6add44266e4ae17b7c55b2a0d1b15f72b193d9b20ad101782c603c4b24893c0564a30ab1c8c14c4cf77ee3a45e9fc8833d9850400

    • SSDEEP

      1536:/9oJ8Skf2ZIohErCHKiJxSn8PmJPYEW9FS+jfi5q7kIu6Zz1/KQBqHLgKccn4npX:FoJ8SfZIos03S8eJG9Fc5+r7uLghx

    • Phemedrone

      An information and wallet stealer written in C#.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

MITRE ATT&CK Enterprise v15

Tasks