General

  • Target

    c43bff3eeb307514a6e2190f3ef492cdf52348b5bc2a0e40dda5552bd4b1a9ee.exe

  • Size

    137KB

  • Sample

    250124-a61gcatjeq

  • MD5

    5da73f1fd8966076bd2eaf560cdbf227

  • SHA1

    668b4299c9a3be60dcccd45391f0aada386a7e02

  • SHA256

    c43bff3eeb307514a6e2190f3ef492cdf52348b5bc2a0e40dda5552bd4b1a9ee

  • SHA512

    a9fec769b06a8e5500239b15103dc30744a57d3224a47a1bb452c81d4c5de816f0e86392664f068c1f1a93786f2ed28bf8de45b8565df3c869144d3adcc258cb

  • SSDEEP

    3072:EMfpIc8a8xzWxYF6dvdfngBl+U8l54rj78DL/nTbxTRU:Sa0R6dRngBlPrqhi

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot8150506061:AAG60-Jyy8Zionycf7a-C_mMPQ5epqvgH-A/sendDocument

Targets

    • Target

      c43bff3eeb307514a6e2190f3ef492cdf52348b5bc2a0e40dda5552bd4b1a9ee.exe

    • Size

      137KB

    • MD5

      5da73f1fd8966076bd2eaf560cdbf227

    • SHA1

      668b4299c9a3be60dcccd45391f0aada386a7e02

    • SHA256

      c43bff3eeb307514a6e2190f3ef492cdf52348b5bc2a0e40dda5552bd4b1a9ee

    • SHA512

      a9fec769b06a8e5500239b15103dc30744a57d3224a47a1bb452c81d4c5de816f0e86392664f068c1f1a93786f2ed28bf8de45b8565df3c869144d3adcc258cb

    • SSDEEP

      3072:EMfpIc8a8xzWxYF6dvdfngBl+U8l54rj78DL/nTbxTRU:Sa0R6dRngBlPrqhi

    • Phemedrone

      An information and wallet stealer written in C#.

    • Phemedrone family

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

MITRE ATT&CK Enterprise v15

Tasks