Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    14-01-2022 09:58

General

  • Target

    e57dc7d009ef98ac72211ccfebcf0492fe4ecae18edc169ee9ae4e12e4a6a09a.exe

  • Size

    545KB

  • MD5

    79d5a88f29f6229e193cb61aa7e8bf07

  • SHA1

    f710cb560c7a33a06f1bfbd19e0c384c485b5e86

  • SHA256

    e57dc7d009ef98ac72211ccfebcf0492fe4ecae18edc169ee9ae4e12e4a6a09a

  • SHA512

    2462a7876534764b83fc4b481cdc3c49d6170017b7de1a17b504869f8022d81ad7bbbfe40cb529ab6aae628a7c1c81c06c9e7a5d7f8a91f92bae323c516b7c17

Score
10/10

Malware Config

Signatures

  • PhoenixStealer

    PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e57dc7d009ef98ac72211ccfebcf0492fe4ecae18edc169ee9ae4e12e4a6a09a.exe
    "C:\Users\Admin\AppData\Local\Temp\e57dc7d009ef98ac72211ccfebcf0492fe4ecae18edc169ee9ae4e12e4a6a09a.exe"
    1⤵
      PID:612

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/612-54-0x0000000075891000-0x0000000075893000-memory.dmp

      Filesize

      8KB