General
-
Target
114d29dfb63b29c803a3e743808ca285e95b380b1378321dca2dff5742423246
-
Size
1.4MB
-
Sample
220604-h3nx5sgfer
-
MD5
2b6e2751a6f1baf22c14eab5554cfcda
-
SHA1
c5afbbcca8d59850427aff8823ca6169670a5fe5
-
SHA256
114d29dfb63b29c803a3e743808ca285e95b380b1378321dca2dff5742423246
-
SHA512
e992fc742f4e2abe44d70618aa39e859cdd09b894aaab0724e9e33d377f7125fbdeb7a8f469f48a0abe213c5658d4c1b1da698d0ab70c0477abafa95e78882ac
Static task
static1
Behavioral task
behavioral1
Sample
114d29dfb63b29c803a3e743808ca285e95b380b1378321dca2dff5742423246.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
114d29dfb63b29c803a3e743808ca285e95b380b1378321dca2dff5742423246.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
Protocol: smtp- Host:
silverlinehospital.in - Port:
587 - Username:
[email protected] - Password:
Bukky101@
Targets
-
-
Target
114d29dfb63b29c803a3e743808ca285e95b380b1378321dca2dff5742423246
-
Size
1.4MB
-
MD5
2b6e2751a6f1baf22c14eab5554cfcda
-
SHA1
c5afbbcca8d59850427aff8823ca6169670a5fe5
-
SHA256
114d29dfb63b29c803a3e743808ca285e95b380b1378321dca2dff5742423246
-
SHA512
e992fc742f4e2abe44d70618aa39e859cdd09b894aaab0724e9e33d377f7125fbdeb7a8f469f48a0abe213c5658d4c1b1da698d0ab70c0477abafa95e78882ac
Score10/10-
Phoenix Keylogger Payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-