Behavioral task
behavioral1
Sample
1528-131-0x0000016297B20000-0x0000016297B60000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1528-131-0x0000016297B20000-0x0000016297B60000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
1528-131-0x0000016297B20000-0x0000016297B60000-memory.dmp
-
Size
256KB
-
MD5
4f468fe80b8de6530ceda89e7b0f1e3d
-
SHA1
4983e0c4d7e8db4d59a25cf6ce8bbf157455f1a4
-
SHA256
171043213a9b9eb6e06dd8f201d95da09091caafefb041b5efb69849bebe71bd
-
SHA512
8a6601290445d8c78cfa919ac28295be7e75f43d764d68c637e7f144cbc6a35f7bff07d1fee29a4bf0438a9afeca492abccf524dcf7e81d122a1faf211c21adc
-
SSDEEP
1536:WmDUeGs1J7fIwquWnkJwXkbLV6ZmB9IADS1u0TjfZ3LWj3Le5eRjIIVwObSqI+nU:nDx1J7fIwpq+8KAh3LAEctWO3/ET
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot8091768794:AAFZsJ1h-6BiszgyLm-eH6c-uITQ7Z99Wbc/sendDocument
Signatures
-
Phemedrone family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1528-131-0x0000016297B20000-0x0000016297B60000-memory.dmp
Files
-
1528-131-0x0000016297B20000-0x0000016297B60000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ