Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    14-01-2022 09:58

General

  • Target

    b30cde9ad856c629664ce75d7c40e129dd87d4c0b5f3a039fcd9aa0b8ef75c50.exe

  • Size

    545KB

  • MD5

    40c4f6d0d1d3f55e82bcf0a26446fb6d

  • SHA1

    63b9a653d682647ec37047641330cf7fa2d4879e

  • SHA256

    b30cde9ad856c629664ce75d7c40e129dd87d4c0b5f3a039fcd9aa0b8ef75c50

  • SHA512

    db3ca4b5d42fd03966069691595eaa1e05057cdf21d7d7e1ed6236dfd4f230b8ff5e825b46ac3ff9c304a375cc694985ee607f32a8065f4f0470ba6f6bfd8314

Score
10/10

Malware Config

Signatures

  • PhoenixStealer

    PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b30cde9ad856c629664ce75d7c40e129dd87d4c0b5f3a039fcd9aa0b8ef75c50.exe
    "C:\Users\Admin\AppData\Local\Temp\b30cde9ad856c629664ce75d7c40e129dd87d4c0b5f3a039fcd9aa0b8ef75c50.exe"
    1⤵
      PID:1404

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1404-55-0x0000000075F81000-0x0000000075F83000-memory.dmp

      Filesize

      8KB