General

  • Target

    607d41c88298d5fdd3624d6ba7a7ae36f7cd90b20bc03390977740fed8b4065d.exe

  • Size

    246KB

  • Sample

    241105-dw3qhawlbj

  • MD5

    e082366c147031e7aaf6ca47a0110ad3

  • SHA1

    51223ecf048edf1627f0f182e923922ff19bbb28

  • SHA256

    607d41c88298d5fdd3624d6ba7a7ae36f7cd90b20bc03390977740fed8b4065d

  • SHA512

    cd91e9852e886451245855ccbc370c6b81cddb6461277f325fabedf0b8fa7d473e582094b66be099266942e9baa18c908a7c6d0db80128dd946a56be0e70ac7f

  • SSDEEP

    3072:zlgkNWf0LIQz3IWFEisl7oAS5WVgK56NMPspkpIl5JNnET:BSf6XzDei8UAbZIEsyQ9

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot8091768794:AAFZsJ1h-6BiszgyLm-eH6c-uITQ7Z99Wbc/sendDocument

Targets

    • Target

      607d41c88298d5fdd3624d6ba7a7ae36f7cd90b20bc03390977740fed8b4065d.exe

    • Size

      246KB

    • MD5

      e082366c147031e7aaf6ca47a0110ad3

    • SHA1

      51223ecf048edf1627f0f182e923922ff19bbb28

    • SHA256

      607d41c88298d5fdd3624d6ba7a7ae36f7cd90b20bc03390977740fed8b4065d

    • SHA512

      cd91e9852e886451245855ccbc370c6b81cddb6461277f325fabedf0b8fa7d473e582094b66be099266942e9baa18c908a7c6d0db80128dd946a56be0e70ac7f

    • SSDEEP

      3072:zlgkNWf0LIQz3IWFEisl7oAS5WVgK56NMPspkpIl5JNnET:BSf6XzDei8UAbZIEsyQ9

    • Phemedrone

      An information and wallet stealer written in C#.

    • Phemedrone family

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

MITRE ATT&CK Enterprise v15

Tasks