General
-
Target
144ddfe3c0e62e05b8ce0939d1f29d135607af839db81b15930ca7d7573470e8
-
Size
1.1MB
-
Sample
220603-bses6adde4
-
MD5
595a48b5a1d9c536fe7f7d3990e2d565
-
SHA1
13436cb9e9402b6d56e16abb0fe49bfcde2bf44c
-
SHA256
144ddfe3c0e62e05b8ce0939d1f29d135607af839db81b15930ca7d7573470e8
-
SHA512
f25ba8884c6b324fc03bec5c88b7cecc4c58a464c0fb6aa0c83d796798bce1a8f214b9707be3444077bfeadd50d6ec0435001cc51c34169fdef5f4253194b453
Static task
static1
Behavioral task
behavioral1
Sample
144ddfe3c0e62e05b8ce0939d1f29d135607af839db81b15930ca7d7573470e8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
144ddfe3c0e62e05b8ce0939d1f29d135607af839db81b15930ca7d7573470e8.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
Protocol: smtp- Host:
silverlinehospital.in - Port:
587 - Username:
[email protected] - Password:
Bukky101@
Targets
-
-
Target
144ddfe3c0e62e05b8ce0939d1f29d135607af839db81b15930ca7d7573470e8
-
Size
1.1MB
-
MD5
595a48b5a1d9c536fe7f7d3990e2d565
-
SHA1
13436cb9e9402b6d56e16abb0fe49bfcde2bf44c
-
SHA256
144ddfe3c0e62e05b8ce0939d1f29d135607af839db81b15930ca7d7573470e8
-
SHA512
f25ba8884c6b324fc03bec5c88b7cecc4c58a464c0fb6aa0c83d796798bce1a8f214b9707be3444077bfeadd50d6ec0435001cc51c34169fdef5f4253194b453
Score10/10-
Phoenix Keylogger Payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-