Resubmissions

16-12-2021 15:50

211216-tab9escdc7 1

01-11-2021 11:55

211101-n3vnksefdn 10

01-11-2021 10:56

211101-m1ptwaeecm 10

Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    01-11-2021 10:56

General

  • Target

    e62467fc0e7982279b2752a3330e741135366e7b318890aa9613ccc5ddcfd37f.exe

  • Size

    546KB

  • MD5

    490f0cff27a1cff0aead0ca3864e15d6

  • SHA1

    d78d47381845c3f712745e709a315a647c017506

  • SHA256

    e62467fc0e7982279b2752a3330e741135366e7b318890aa9613ccc5ddcfd37f

  • SHA512

    567de9d34fc6a0d74540f3d168cf6441e5cc5d5c7d95e2907ae6e0f0ab7b09f90f60dc15480c5e52873db2832542058f92757bcb952130525b2ffef10f68ee73

Score
10/10

Malware Config

Signatures

  • PhoenixStealer

    PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e62467fc0e7982279b2752a3330e741135366e7b318890aa9613ccc5ddcfd37f.exe
    "C:\Users\Admin\AppData\Local\Temp\e62467fc0e7982279b2752a3330e741135366e7b318890aa9613ccc5ddcfd37f.exe"
    1⤵
      PID:560

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/560-54-0x00000000751D1000-0x00000000751D3000-memory.dmp

      Filesize

      8KB