Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-12-2024 17:48
Behavioral task
behavioral1
Sample
actualka-main/43134134.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
actualka-main/43134134.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
actualka-main/Dyfolyj.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
actualka-main/Dyfolyj.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
actualka-main/jajajdva.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
actualka-main/jajajdva.exe
Resource
win10v2004-20241007-en
General
-
Target
actualka-main/Dyfolyj.exe
-
Size
138KB
-
MD5
63805e5c8dc2663c4fa6f5f0c05bec84
-
SHA1
7b26611fdf98030c9c7da442bb17bb90c5424a90
-
SHA256
375bc635b33a9259f57fb15769fa741ede79d0e3f2a870e0047b3748879e491b
-
SHA512
c275fc55948436dd05cf478291f85951dbcaf21e2a707c4e0022083f86f16517a7923fb2ca2bd962044ef2a183189daf574a6e5e7d8d6bdbd7ed86095a920f60
-
SSDEEP
1536:OcxA4IFzn6/VvFmaUo8xUZAAg3WaDj7XWu0/N55Alh7bkcSjPi7ddI1VQN3kdb73:Ocx2bouad8xsAAFaW55eb5a40ZNcu
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot7504884591:AAEUFOz7SSR-3mUp0oiq_7UmkztEy-AQCyw/sendDocument
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Phemedrone family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1964 Dyfolyj.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1964 Dyfolyj.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2988 1964 Dyfolyj.exe 31 PID 1964 wrote to memory of 2988 1964 Dyfolyj.exe 31 PID 1964 wrote to memory of 2988 1964 Dyfolyj.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\actualka-main\Dyfolyj.exe"C:\Users\Admin\AppData\Local\Temp\actualka-main\Dyfolyj.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1964 -s 8322⤵PID:2988
-