Analysis

  • max time kernel
    4294178s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    03-03-2022 08:56

General

  • Target

    3b63821a301af608a2dfd7b274f69266.exe

  • Size

    545KB

  • MD5

    3b63821a301af608a2dfd7b274f69266

  • SHA1

    dc6eda319f754859fc555c7664546502fc89fc14

  • SHA256

    c153071c43613a6ff4c454e3fda8c29ac41908fa8e6dab9d9f021e9263b456a2

  • SHA512

    ad8f30dfa4e2bc3d36ecb3a7f6a9966b8ed897e53abae870c23239e14aa354cbbefdbe80dd7058e2e6fdcafbea912b2ed35f23f15eed4de85f72155fbfdd1cf2

Score
10/10

Malware Config

Signatures

  • PhoenixStealer

    PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b63821a301af608a2dfd7b274f69266.exe
    "C:\Users\Admin\AppData\Local\Temp\3b63821a301af608a2dfd7b274f69266.exe"
    1⤵
      PID:1792

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1792-54-0x00000000752A1000-0x00000000752A3000-memory.dmp

      Filesize

      8KB