Behavioral task
behavioral1
Sample
1896-81-0x0000000000440000-0x000000000089E000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1896-81-0x0000000000440000-0x000000000089E000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
1896-81-0x0000000000440000-0x000000000089E000-memory.dmp
-
Size
4.4MB
-
MD5
aa352bd398359d6ae3f98cc1b91f0b79
-
SHA1
e4e101b401ba2c070a88722c8d4fa58ecf8ef10d
-
SHA256
5457358583a98b5bd53aa289ea621ec394f13b21aea6d2e2f3d09dcf63475995
-
SHA512
72f5e5196d2ba46823f26165a02c1482b136967a23087a2f818447136043de37dc426101bfd09abb008e73ef51d215bc1469af1dc95f9cfa4f9e5b35c067688e
-
SSDEEP
98304:6E993lwTuntMK6hYLWapqnpjm64cRftE8:62yeLWapqtm8m8
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot7748267151:AAHJX2M4rJ5MRUvgJ9XqTgoOgAd1r_j9htM/sendDocument
Signatures
-
Phemedrone family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1896-81-0x0000000000440000-0x000000000089E000-memory.dmp
Files
-
1896-81-0x0000000000440000-0x000000000089E000-memory.dmp.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE