Analysis

  • max time kernel
    96s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    03-03-2022 10:58

General

  • Target

    fd56be6e3c28585e6099cbfe704cde34d3b3b850e7f2d621df0bdb2913fdbe8c.exe

  • Size

    545KB

  • MD5

    8aeeb992301a098d834460e919ee9319

  • SHA1

    64f21b539240f25a8683ea3c8efcfc9d4f68f9a0

  • SHA256

    fd56be6e3c28585e6099cbfe704cde34d3b3b850e7f2d621df0bdb2913fdbe8c

  • SHA512

    920d511d0efdd79f6bc410dde6402d22199d4b7b976c64ae08fd74a5789b1636e02812df8adb4f1f3e352834b0d02fd44d043297d43b7584bbc70a42bbd49b81

Score
10/10

Malware Config

Signatures

  • PhoenixStealer

    PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd56be6e3c28585e6099cbfe704cde34d3b3b850e7f2d621df0bdb2913fdbe8c.exe
    "C:\Users\Admin\AppData\Local\Temp\fd56be6e3c28585e6099cbfe704cde34d3b3b850e7f2d621df0bdb2913fdbe8c.exe"
    1⤵
      PID:2940

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads