Analysis
-
max time kernel
100s -
max time network
112s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
20-01-2025 06:34
Behavioral task
behavioral1
Sample
Rypopub.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Rypopub.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
Rypopub.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Rypopub.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral5
Sample
Rypopub.exe
Resource
win11-20241007-en
General
-
Target
Rypopub.exe
-
Size
139KB
-
MD5
c2f418de14370af7a16f26cec5658ccb
-
SHA1
5195452e1da9e513253cb028e188f1746fd26041
-
SHA256
c65baf9a0a42b73030bce7d70a546332422d9101b902d638f4fab99a91ad88e5
-
SHA512
7915b3d35503588b34a059202f6fb76ece86cf095b1bdf8e778721b65683db91dae1aed8e8d085b6ee129ee45902da1f547d4d88e30bfd14f1d31aa7f9fe3d5a
-
SSDEEP
3072:Ft5w0J9peBZFTW28M8T8ON1l5VYxl4F+PuK:15EYThO
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot8185640178:AAEe-sIhlh5lPD_qjEnaSBnrB-YWsmO-Jcg/sendDocument
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Phemedrone family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1472 Rypopub.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1472 Rypopub.exe