General

  • Target

    cb2597bf26ec81f4a2d122b8de39c45330b1f1a8f7a9a8ea095a293572dd2f56.exe

  • Size

    137KB

  • Sample

    250124-jwddhazkfk

  • MD5

    2e3ce318d5d7fa3ed19ea75b77034450

  • SHA1

    7f1a1d375777baf2d0d5bf76bb726f4e43ee2b04

  • SHA256

    cb2597bf26ec81f4a2d122b8de39c45330b1f1a8f7a9a8ea095a293572dd2f56

  • SHA512

    73a5d2214882b52207b21b756e424567ac3feade4d98078a1ed046fd0da93104803f4d47a9edb69436d46b4251974cdf612bbcf8f93381e1a4d2d35df4c4326d

  • SSDEEP

    1536:ZcxszwMvwxIHvasalo8sXlrhWrS9LZFvjWu0f5hX6x3IgiL4Tlfa/CaKNajlGXCO:ZcxskQqITaC8s1wrcHA50fiM+CjN54M

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot8099036721:AAEN5KI3j-IoiuS_5ydqorZ7b-dLXrvmeiE/sendDocument

Targets

    • Target

      cb2597bf26ec81f4a2d122b8de39c45330b1f1a8f7a9a8ea095a293572dd2f56.exe

    • Size

      137KB

    • MD5

      2e3ce318d5d7fa3ed19ea75b77034450

    • SHA1

      7f1a1d375777baf2d0d5bf76bb726f4e43ee2b04

    • SHA256

      cb2597bf26ec81f4a2d122b8de39c45330b1f1a8f7a9a8ea095a293572dd2f56

    • SHA512

      73a5d2214882b52207b21b756e424567ac3feade4d98078a1ed046fd0da93104803f4d47a9edb69436d46b4251974cdf612bbcf8f93381e1a4d2d35df4c4326d

    • SSDEEP

      1536:ZcxszwMvwxIHvasalo8sXlrhWrS9LZFvjWu0f5hX6x3IgiL4Tlfa/CaKNajlGXCO:ZcxskQqITaC8s1wrcHA50fiM+CjN54M

    • Phemedrone

      An information and wallet stealer written in C#.

    • Phemedrone family

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

MITRE ATT&CK Enterprise v15

Tasks