Behavioral task
behavioral1
Sample
8415f13b0232d073f4aa9e345407260998e5b7b10b4800fc34d064d77dd140f3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8415f13b0232d073f4aa9e345407260998e5b7b10b4800fc34d064d77dd140f3.exe
Resource
win10v2004-20241007-en
General
-
Target
19487407331.zip
-
Size
57KB
-
MD5
936817dfec6d50527f98309fd3939d14
-
SHA1
c0991e8209043cccd1a15089153413b101b809c3
-
SHA256
190675e9d7fe6a7b38f5d5e1780dbfdb28e4394afa3b0366a4bcfb1291cdfe1d
-
SHA512
39aca5c3d2121f3fe9d62964fcff9b1671d8b96d6b44de74fff7eb0c1b96bbd7bfe952d89a8b0311c8b773e2ed3d8c18585376d30ac4c20eb5e45670a34cc1d2
-
SSDEEP
1536:vx7KzPeEHsG3lmfwRgil7D6NWtiq0zoJ9afxhSFV2lc:xa2tG1mvil6c4L9fOFoy
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot7497338331:AAEJGEIPkQdHc_37msPzyi9qbnEG1SgWnyg/sendDocument
Signatures
-
Phemedrone family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/8415f13b0232d073f4aa9e345407260998e5b7b10b4800fc34d064d77dd140f3
Files
-
19487407331.zip.zip
Password: infected_october2024
-
8415f13b0232d073f4aa9e345407260998e5b7b10b4800fc34d064d77dd140f3.exe windows:4 windows x86 arch:x86
Password: infected_october2024
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 118KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ