General

  • Target

    Nucovyc.exe

  • Size

    121KB

  • Sample

    250112-dpklcatley

  • MD5

    97ef39939aa80c9ce0c408cfe73ff5eb

  • SHA1

    9ff05a31dd8704fb9b5645567ab4eaf4f36b0387

  • SHA256

    100ccca5c8ea5f76add93243fc2a8a30d638bdb24a95c832b7eadb573f70e010

  • SHA512

    c79c8326a9b874ff456d07aef715b66d0efae5cea05f511f16d062c463255127b5093666c0446da4b6cdffc0ba09d7c641e21eba08fdd5929b7a357d9eb59ce0

  • SSDEEP

    3072:1aI86MVB5BGziRG3vjCB5HlN4HSTswpL:E/giRwGLIHSTswp

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7138327209:AAHwN-UO0-GBO8id5b_YFZRrxJ7ZaB0MYtc/sendDocument

Targets

    • Target

      Nucovyc.exe

    • Size

      121KB

    • MD5

      97ef39939aa80c9ce0c408cfe73ff5eb

    • SHA1

      9ff05a31dd8704fb9b5645567ab4eaf4f36b0387

    • SHA256

      100ccca5c8ea5f76add93243fc2a8a30d638bdb24a95c832b7eadb573f70e010

    • SHA512

      c79c8326a9b874ff456d07aef715b66d0efae5cea05f511f16d062c463255127b5093666c0446da4b6cdffc0ba09d7c641e21eba08fdd5929b7a357d9eb59ce0

    • SSDEEP

      3072:1aI86MVB5BGziRG3vjCB5HlN4HSTswpL:E/giRwGLIHSTswp

    • Phemedrone

      An information and wallet stealer written in C#.

    • Phemedrone family

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

MITRE ATT&CK Enterprise v15

Tasks