General

  • Target

    actualka-main.zip

  • Size

    1.5MB

  • MD5

    b9d72464170e8d575b6f797b1388db52

  • SHA1

    b751f2c01cb927e06f5dbea569628a0e0dd9c857

  • SHA256

    bf95ef9885845dd991d92c6fbc8012a309f8104ad603361c54e41c9b57e4f3f0

  • SHA512

    bb31db007a43d5b8c2f0d394067ad20949e904d23be91a6c4a2e7221f77fd6064fa890d3a99f2e14edfb657e41a6ee2dbec5f94744bbf85aa8b04efd3fea2296

  • SSDEEP

    24576:VBBKlNPXO89b0ln20EYjdoMfe80PnVMP4/MDOJX0LLwliqoRWQu0/9hT:Vm+89bYPEuoMW80Pm/P3wli9nT

Score
10/10

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7504884591:AAEUFOz7SSR-3mUp0oiq_7UmkztEy-AQCyw/sendDocument

Signatures

  • Phemedrone family
  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • actualka-main.zip
    .zip
  • actualka-main/43134134.exe
    .exe windows:6 windows x64 arch:x64

    25224432afaf13c692f24efcb620c38b


    Headers

    Imports

    Sections

  • actualka-main/Dyfolyj.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • actualka-main/file
  • actualka-main/jajajdva.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • actualka-main/tumbler_G