General

  • Target

    ac8e626519c05605c72068707d928ff75efe3a43972562aa0419a49dd4658016N.exe

  • Size

    137KB

  • Sample

    250124-wk3kgaskcr

  • MD5

    388b52b302d88160ee4571f1c705fbb0

  • SHA1

    4c5568d7283d2825cd4060300ef466450d33339a

  • SHA256

    ac8e626519c05605c72068707d928ff75efe3a43972562aa0419a49dd4658016

  • SHA512

    a70662b01b42fb7385ea31f7730353a0651799cc0e080a7154f700fedbac9361f5cd66840b8a145c0390d48e21d4f299561d3961515e536ac411331cd6931e31

  • SSDEEP

    3072:EMfpIc8a8xzWxYF6dvdfngBl+U8l54rj78DL/nTbxTR:Sa0R6dRngBlPrqh

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot8150506061:AAG60-Jyy8Zionycf7a-C_mMPQ5epqvgH-A/sendDocument

Targets

    • Target

      ac8e626519c05605c72068707d928ff75efe3a43972562aa0419a49dd4658016N.exe

    • Size

      137KB

    • MD5

      388b52b302d88160ee4571f1c705fbb0

    • SHA1

      4c5568d7283d2825cd4060300ef466450d33339a

    • SHA256

      ac8e626519c05605c72068707d928ff75efe3a43972562aa0419a49dd4658016

    • SHA512

      a70662b01b42fb7385ea31f7730353a0651799cc0e080a7154f700fedbac9361f5cd66840b8a145c0390d48e21d4f299561d3961515e536ac411331cd6931e31

    • SSDEEP

      3072:EMfpIc8a8xzWxYF6dvdfngBl+U8l54rj78DL/nTbxTR:Sa0R6dRngBlPrqh

    • Phemedrone

      An information and wallet stealer written in C#.

    • Phemedrone family

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

MITRE ATT&CK Enterprise v15

Tasks