General

  • Target

    a1889a999e50a8b09a9f16c2b7e3fb6982e874eeda69a99172979912836296ce.exe

  • Size

    7.7MB

  • Sample

    241104-kg2cfszram

  • MD5

    83ec5ff1280377d70ff933a83977c570

  • SHA1

    24ec90ad79d43990046aaf963ed5b2eac32fb319

  • SHA256

    a1889a999e50a8b09a9f16c2b7e3fb6982e874eeda69a99172979912836296ce

  • SHA512

    b91f7aca28bc891f22229205db83d371fdebfb931d32c0ac5317dbde78430182a053e6d24949060a1af8abac777d6c797f846f676c23c1a07c0a0a3369f71bc6

  • SSDEEP

    196608:y0oV/SY8XMCHGLLc54i1wN+lPIcu9KYK39s7kX3PPJNMRRccx:oYXMCHWUjqcuIWq/PJNe

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot8091768794:AAFZsJ1h-6BiszgyLm-eH6c-uITQ7Z99Wbc/sendDocument

Targets

    • Target

      a1889a999e50a8b09a9f16c2b7e3fb6982e874eeda69a99172979912836296ce.exe

    • Size

      7.7MB

    • MD5

      83ec5ff1280377d70ff933a83977c570

    • SHA1

      24ec90ad79d43990046aaf963ed5b2eac32fb319

    • SHA256

      a1889a999e50a8b09a9f16c2b7e3fb6982e874eeda69a99172979912836296ce

    • SHA512

      b91f7aca28bc891f22229205db83d371fdebfb931d32c0ac5317dbde78430182a053e6d24949060a1af8abac777d6c797f846f676c23c1a07c0a0a3369f71bc6

    • SSDEEP

      196608:y0oV/SY8XMCHGLLc54i1wN+lPIcu9KYK39s7kX3PPJNMRRccx:oYXMCHWUjqcuIWq/PJNe

    • Phemedrone

      An information and wallet stealer written in C#.

    • Phemedrone family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

MITRE ATT&CK Enterprise v15

Tasks