Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    03-03-2022 08:43

General

  • Target

    43c72a273a4c430c9fda1654cb9be2cf.exe

  • Size

    545KB

  • MD5

    43c72a273a4c430c9fda1654cb9be2cf

  • SHA1

    5fc4ee57193abd315a5910035cf8ca7f7d06c50b

  • SHA256

    a97397b1d9ac7e1b1aab153d2529680c0d6f0977c9e2f68c3febd1661629dbe1

  • SHA512

    b4eec12e7aefde68bdab987a4d5d87e2d691d625d112636f0ad6b89ec505c13513e7472f7c8571869ea0366dd0247caab08976bb3b492703be6f443138deb9b5

Score
10/10

Malware Config

Signatures

  • PhoenixStealer

    PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

Processes

  • C:\Users\Admin\AppData\Local\Temp\43c72a273a4c430c9fda1654cb9be2cf.exe
    "C:\Users\Admin\AppData\Local\Temp\43c72a273a4c430c9fda1654cb9be2cf.exe"
    1⤵
      PID:1620

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1620-55-0x0000000076921000-0x0000000076923000-memory.dmp

      Filesize

      8KB