General

  • Target

    Rypopub.exe

  • Size

    139KB

  • Sample

    250120-hbxe7swncn

  • MD5

    c2f418de14370af7a16f26cec5658ccb

  • SHA1

    5195452e1da9e513253cb028e188f1746fd26041

  • SHA256

    c65baf9a0a42b73030bce7d70a546332422d9101b902d638f4fab99a91ad88e5

  • SHA512

    7915b3d35503588b34a059202f6fb76ece86cf095b1bdf8e778721b65683db91dae1aed8e8d085b6ee129ee45902da1f547d4d88e30bfd14f1d31aa7f9fe3d5a

  • SSDEEP

    3072:Ft5w0J9peBZFTW28M8T8ON1l5VYxl4F+PuK:15EYThO

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot8185640178:AAEe-sIhlh5lPD_qjEnaSBnrB-YWsmO-Jcg/sendDocument

Targets

    • Target

      Rypopub.exe

    • Size

      139KB

    • MD5

      c2f418de14370af7a16f26cec5658ccb

    • SHA1

      5195452e1da9e513253cb028e188f1746fd26041

    • SHA256

      c65baf9a0a42b73030bce7d70a546332422d9101b902d638f4fab99a91ad88e5

    • SHA512

      7915b3d35503588b34a059202f6fb76ece86cf095b1bdf8e778721b65683db91dae1aed8e8d085b6ee129ee45902da1f547d4d88e30bfd14f1d31aa7f9fe3d5a

    • SSDEEP

      3072:Ft5w0J9peBZFTW28M8T8ON1l5VYxl4F+PuK:15EYThO

    • Phemedrone

      An information and wallet stealer written in C#.

    • Phemedrone family

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

MITRE ATT&CK Enterprise v15

Tasks