General

  • Target

    246f939789eb66df0dc7cb67c22ebcb8c0cfe4b0ec0f222482da9b2823e9ab32

  • Size

    128KB

  • Sample

    241115-y3vzfs1fle

  • MD5

    71f0c1101306ebd89735b734b500fe10

  • SHA1

    398028832a41b64f1f1b0e865a3cccb922350fb2

  • SHA256

    246f939789eb66df0dc7cb67c22ebcb8c0cfe4b0ec0f222482da9b2823e9ab32

  • SHA512

    80497083cd21b2ae986c80378f30c6d3ad597a5720c776de5abc51ff732a8b566e0f7ae7f7f91c868443e17a1b60f1b0bfb54fa9eb3de37b4ab7454b6cffba25

  • SSDEEP

    3072:4KkwPHTgqHc/nREvhnQ78e5S+wbDwEKT3uj9E0G:o6z5HVpQ89gEK/0

Malware Config

Targets

    • Target

      246f939789eb66df0dc7cb67c22ebcb8c0cfe4b0ec0f222482da9b2823e9ab32

    • Size

      128KB

    • MD5

      71f0c1101306ebd89735b734b500fe10

    • SHA1

      398028832a41b64f1f1b0e865a3cccb922350fb2

    • SHA256

      246f939789eb66df0dc7cb67c22ebcb8c0cfe4b0ec0f222482da9b2823e9ab32

    • SHA512

      80497083cd21b2ae986c80378f30c6d3ad597a5720c776de5abc51ff732a8b566e0f7ae7f7f91c868443e17a1b60f1b0bfb54fa9eb3de37b4ab7454b6cffba25

    • SSDEEP

      3072:4KkwPHTgqHc/nREvhnQ78e5S+wbDwEKT3uj9E0G:o6z5HVpQ89gEK/0

    • Phemedrone

      An information and wallet stealer written in C#.

    • Phemedrone family

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

MITRE ATT&CK Enterprise v15

Tasks