Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/02/2025, 21:01
Behavioral task
behavioral1
Sample
Vilulak.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Vilulak.exe
Resource
win10v2004-20250217-en
General
-
Target
Vilulak.exe
-
Size
139KB
-
MD5
887d09268180e22844fd151ec8936467
-
SHA1
8e50d19033f09fcd62cd8f8cb4b9b07b88933b22
-
SHA256
6d7a297fc009eefde64af6a743cb81f9fa98f1ec3340c0b0fc05161f032dc34f
-
SHA512
6270a0e53d60873dff9879d722682fa455d5ccc472fc8b6457930ab3cd17e0b6c96e7f70c730eaeeaba0c5e96b450e45aaa2ecba4a4e660c42424722c67f2e95
-
SSDEEP
3072:xz58i5RJfMHAHN7A1Yp5isg9DefFZYLwa0p:bH9H9A1lsAMFGLwa
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot7469332992:AAHjDMoBLYZVNIkN0fY-QFvOBAnM-_4HeYg/sendDocument
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Phemedrone family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1968 Vilulak.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1968 Vilulak.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2748 1968 Vilulak.exe 31 PID 1968 wrote to memory of 2748 1968 Vilulak.exe 31 PID 1968 wrote to memory of 2748 1968 Vilulak.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vilulak.exe"C:\Users\Admin\AppData\Local\Temp\Vilulak.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1968 -s 8362⤵PID:2748
-