Analysis

  • max time kernel
    159s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    03-03-2022 08:05

General

  • Target

    2779a981bae47dccca241d3af3e2b794722dbad3aa7e04a81198e8e9267b0882.exe

  • Size

    545KB

  • MD5

    b9e1bc05d4da0d3626be8f6fa7f110ef

  • SHA1

    120dabd802c70f97037d5c474ec14483517e5d05

  • SHA256

    2779a981bae47dccca241d3af3e2b794722dbad3aa7e04a81198e8e9267b0882

  • SHA512

    d3e3f76e75493c8bb731b23b6dd191aad49830407ef01ae03204a51242d84d12652b1644de427521dadf3570d5c29b6ec788615d8c499f40a18dfc57e5a6cdb0

Score
10/10

Malware Config

Signatures

  • PhoenixStealer

    PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2779a981bae47dccca241d3af3e2b794722dbad3aa7e04a81198e8e9267b0882.exe
    "C:\Users\Admin\AppData\Local\Temp\2779a981bae47dccca241d3af3e2b794722dbad3aa7e04a81198e8e9267b0882.exe"
    1⤵
      PID:428

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads