General

  • Target

    b23d010aa287d6f90da915d1bb8f06d709688ae5f9bfd512fdb2f9562145461f.exe

  • Size

    128KB

  • Sample

    241111-z4835szmhm

  • MD5

    aeb13f6436897628cc700ed532170782

  • SHA1

    3c76c3fb63dc5fb5c4b019fb2ae3cd3cc0aa3155

  • SHA256

    b23d010aa287d6f90da915d1bb8f06d709688ae5f9bfd512fdb2f9562145461f

  • SHA512

    59fb52f6628acd110c79f8da9399b0f228b154a30a5c4ad779e1d9995ffe56e590edf66fa64e75709a1ac47377492863f4646646e9b61801e2cd0279535d875b

  • SSDEEP

    3072:4KkwPHTgqHc/nREvhnQ78e5S+wbDwEKT3uj9E0Goc:o6z5HVpQ89gEK/0+

Malware Config

Targets

    • Target

      b23d010aa287d6f90da915d1bb8f06d709688ae5f9bfd512fdb2f9562145461f.exe

    • Size

      128KB

    • MD5

      aeb13f6436897628cc700ed532170782

    • SHA1

      3c76c3fb63dc5fb5c4b019fb2ae3cd3cc0aa3155

    • SHA256

      b23d010aa287d6f90da915d1bb8f06d709688ae5f9bfd512fdb2f9562145461f

    • SHA512

      59fb52f6628acd110c79f8da9399b0f228b154a30a5c4ad779e1d9995ffe56e590edf66fa64e75709a1ac47377492863f4646646e9b61801e2cd0279535d875b

    • SSDEEP

      3072:4KkwPHTgqHc/nREvhnQ78e5S+wbDwEKT3uj9E0Goc:o6z5HVpQ89gEK/0+

    • Phemedrone

      An information and wallet stealer written in C#.

    • Phemedrone family

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

MITRE ATT&CK Enterprise v15

Tasks