Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 06:34
Behavioral task
behavioral1
Sample
Rypopub.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Rypopub.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
Rypopub.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Rypopub.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral5
Sample
Rypopub.exe
Resource
win11-20241007-en
General
-
Target
Rypopub.exe
-
Size
139KB
-
MD5
c2f418de14370af7a16f26cec5658ccb
-
SHA1
5195452e1da9e513253cb028e188f1746fd26041
-
SHA256
c65baf9a0a42b73030bce7d70a546332422d9101b902d638f4fab99a91ad88e5
-
SHA512
7915b3d35503588b34a059202f6fb76ece86cf095b1bdf8e778721b65683db91dae1aed8e8d085b6ee129ee45902da1f547d4d88e30bfd14f1d31aa7f9fe3d5a
-
SSDEEP
3072:Ft5w0J9peBZFTW28M8T8ON1l5VYxl4F+PuK:15EYThO
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot8185640178:AAEe-sIhlh5lPD_qjEnaSBnrB-YWsmO-Jcg/sendDocument
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Phemedrone family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3008 Rypopub.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3008 Rypopub.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3008 wrote to memory of 1804 3008 Rypopub.exe 29 PID 3008 wrote to memory of 1804 3008 Rypopub.exe 29 PID 3008 wrote to memory of 1804 3008 Rypopub.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rypopub.exe"C:\Users\Admin\AppData\Local\Temp\Rypopub.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3008 -s 5762⤵PID:1804
-