Analysis

  • max time kernel
    118s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    14-01-2022 09:58

General

  • Target

    19607d8869d9e120eb1b5b09c79b0b90bab58f0e8a2fd5c13f98efa2606ab19d.exe

  • Size

    545KB

  • MD5

    ef991d51b7f08efd709a22c23452a16e

  • SHA1

    ba551a57ab4c0dfdbbf3402b4312fe7c737451c6

  • SHA256

    19607d8869d9e120eb1b5b09c79b0b90bab58f0e8a2fd5c13f98efa2606ab19d

  • SHA512

    d1535e2f930d8e2d493afa14b3dafad70c79bb55e0f081ba021b6d251f1d0e03b9a7cd10303bf6fa98ffa253f0bf073e87c06ad5e71f8d4d6a8503176ab3b35f

Score
10/10

Malware Config

Signatures

  • PhoenixStealer

    PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

Processes

  • C:\Users\Admin\AppData\Local\Temp\19607d8869d9e120eb1b5b09c79b0b90bab58f0e8a2fd5c13f98efa2606ab19d.exe
    "C:\Users\Admin\AppData\Local\Temp\19607d8869d9e120eb1b5b09c79b0b90bab58f0e8a2fd5c13f98efa2606ab19d.exe"
    1⤵
      PID:1908

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1908-54-0x0000000076731000-0x0000000076733000-memory.dmp

      Filesize

      8KB