General

  • Target

    246f939789eb66df0dc7cb67c22ebcb8c0cfe4b0ec0f222482da9b2823e9ab32N.exe

  • Size

    128KB

  • Sample

    241112-e6khcayjbr

  • MD5

    285eb8f7641526bf825641f3e79559f1

  • SHA1

    d5b86d8ef7bb15b0509494fcf94c56159bac0b44

  • SHA256

    4a9acb3d5974e491d5ff17867b79f3fb1b6c244674d4ca56d70eaa133e17d672

  • SHA512

    094fb8642d389a7fa570f3f16dbd6042ef6d472feb45b1c00c6cc6c4815764e31e5ea43583244095aa5d1010d779415a66d223b9ff60ae96a06400cab7d52eda

  • SSDEEP

    3072:4KkwPHTgqHc/nREvhnQ78e5S+wbDwEKT3uj9E0Gp:o6z5HVpQ89gEK/0Y

Malware Config

Targets

    • Target

      246f939789eb66df0dc7cb67c22ebcb8c0cfe4b0ec0f222482da9b2823e9ab32N.exe

    • Size

      128KB

    • MD5

      285eb8f7641526bf825641f3e79559f1

    • SHA1

      d5b86d8ef7bb15b0509494fcf94c56159bac0b44

    • SHA256

      4a9acb3d5974e491d5ff17867b79f3fb1b6c244674d4ca56d70eaa133e17d672

    • SHA512

      094fb8642d389a7fa570f3f16dbd6042ef6d472feb45b1c00c6cc6c4815764e31e5ea43583244095aa5d1010d779415a66d223b9ff60ae96a06400cab7d52eda

    • SSDEEP

      3072:4KkwPHTgqHc/nREvhnQ78e5S+wbDwEKT3uj9E0Gp:o6z5HVpQ89gEK/0Y

    • Phemedrone

      An information and wallet stealer written in C#.

    • Phemedrone family

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

MITRE ATT&CK Enterprise v15

Tasks