General

  • Target

    Temppot_Protected.bin

  • Size

    288KB

  • Sample

    201029-ta1j98mbls

  • MD5

    c42599e95105b0f96915f009cf9b0956

  • SHA1

    591049db2ec06a767ccc107a580470e85a094c58

  • SHA256

    580006399ce81551ccf09b2ff057eb3a1a8b74cd2234419292f9cdc79945fb16

  • SHA512

    d869ff010821bdc8046ed9632eccefb887c0be9c65b71bf66adebced69cfd815300388a5bc86030c660f40f2add2ec21c1d15b9d8ac05a26bd0cc8c836f7b6a1

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.mail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    favour1997

Targets

    • Target

      Temppot_Protected.bin

    • Size

      288KB

    • MD5

      c42599e95105b0f96915f009cf9b0956

    • SHA1

      591049db2ec06a767ccc107a580470e85a094c58

    • SHA256

      580006399ce81551ccf09b2ff057eb3a1a8b74cd2234419292f9cdc79945fb16

    • SHA512

      d869ff010821bdc8046ed9632eccefb887c0be9c65b71bf66adebced69cfd815300388a5bc86030c660f40f2add2ec21c1d15b9d8ac05a26bd0cc8c836f7b6a1

    • Phoenix Keylogger

      Phoenix is a keylogger and info stealer first seen in July 2019.

    • Phoenix Keylogger Payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks