Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    14-01-2022 09:58

General

  • Target

    3db06d6a8262c2cd93e817dc27cacac537c55bd535bd8b36ab19f7db5f749bd0.exe

  • Size

    545KB

  • MD5

    da96ecbb6403cd7d3206390a7df51284

  • SHA1

    ecfa2ad556544fe068e6b2faaf696afbb2e94dcf

  • SHA256

    3db06d6a8262c2cd93e817dc27cacac537c55bd535bd8b36ab19f7db5f749bd0

  • SHA512

    78320cd962c02d9786c72e8b7f74fc588d973f0aee7b0e75f97b82d1224d1dcb48a5f2ae1831fbc68c29126bc32c9621f22f15c8d6ec63e210a9323c168420f2

Score
10/10

Malware Config

Signatures

  • PhoenixStealer

    PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3db06d6a8262c2cd93e817dc27cacac537c55bd535bd8b36ab19f7db5f749bd0.exe
    "C:\Users\Admin\AppData\Local\Temp\3db06d6a8262c2cd93e817dc27cacac537c55bd535bd8b36ab19f7db5f749bd0.exe"
    1⤵
      PID:1684

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1684-54-0x0000000076421000-0x0000000076423000-memory.dmp

      Filesize

      8KB