Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    14-01-2022 09:58

General

  • Target

    706a5750ca3477cae9776b462e5e908df54520beb337a9f426db7daa321cfe27.exe

  • Size

    545KB

  • MD5

    27d6483ab0f02f112a5157afe090c795

  • SHA1

    cf4efac16d0934f556fc33446610016c1ce9ab06

  • SHA256

    706a5750ca3477cae9776b462e5e908df54520beb337a9f426db7daa321cfe27

  • SHA512

    965dea65b8358a98865bf3a0369174cc70410d685b2761eb22e767ab4d4bd8737917340a04e1e451edf1df1b8714a06c7c0b0899997f435d0d5f6af5ea2ba81d

Score
10/10

Malware Config

Signatures

  • PhoenixStealer

    PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

Processes

  • C:\Users\Admin\AppData\Local\Temp\706a5750ca3477cae9776b462e5e908df54520beb337a9f426db7daa321cfe27.exe
    "C:\Users\Admin\AppData\Local\Temp\706a5750ca3477cae9776b462e5e908df54520beb337a9f426db7daa321cfe27.exe"
    1⤵
      PID:1664

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1664-54-0x0000000075B51000-0x0000000075B53000-memory.dmp

      Filesize

      8KB