General

  • Target

    6b60428dcf426f1445fe78b35f0f995179b456c55dbab1cc0aad394bbb6d7630N.exe

  • Size

    138KB

  • Sample

    250104-tkesasymfr

  • MD5

    521386856dc661956c2a44bbb62a6b40

  • SHA1

    dd0ab4840ec2c9051c5c333dd6047710c5a87ffe

  • SHA256

    6b60428dcf426f1445fe78b35f0f995179b456c55dbab1cc0aad394bbb6d7630

  • SHA512

    8fd57ab61527dc1f94214da64c54d064013c2071c9cf3860fff719fede12866ac79cd46e1ce88a32971e571b72faacb2762214696d40a1fd897d925651a20648

  • SSDEEP

    1536:NrfUMmvYGML1m4YBcISd1vticZzmNyQdLFWu0W55Jc+L1+nIAOAG5rwf3O4P0Dxh:Nr8MmvQL0Qd1v9cNR5W+1+nI23OXJG6

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7680770119:AAEYBnZhEMPfJsgkH4qnTczGnmQ95OxUGhU/sendDocument

Targets

    • Target

      6b60428dcf426f1445fe78b35f0f995179b456c55dbab1cc0aad394bbb6d7630N.exe

    • Size

      138KB

    • MD5

      521386856dc661956c2a44bbb62a6b40

    • SHA1

      dd0ab4840ec2c9051c5c333dd6047710c5a87ffe

    • SHA256

      6b60428dcf426f1445fe78b35f0f995179b456c55dbab1cc0aad394bbb6d7630

    • SHA512

      8fd57ab61527dc1f94214da64c54d064013c2071c9cf3860fff719fede12866ac79cd46e1ce88a32971e571b72faacb2762214696d40a1fd897d925651a20648

    • SSDEEP

      1536:NrfUMmvYGML1m4YBcISd1vticZzmNyQdLFWu0W55Jc+L1+nIAOAG5rwf3O4P0Dxh:Nr8MmvQL0Qd1v9cNR5W+1+nI23OXJG6

    • Phemedrone

      An information and wallet stealer written in C#.

    • Phemedrone family

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

MITRE ATT&CK Enterprise v15

Tasks