General

  • Target

    114d29dfb63b29c803a3e743808ca285e95b380b1378321dca2dff5742423246

  • Size

    1.4MB

  • Sample

    220604-h3nx5sgfer

  • MD5

    2b6e2751a6f1baf22c14eab5554cfcda

  • SHA1

    c5afbbcca8d59850427aff8823ca6169670a5fe5

  • SHA256

    114d29dfb63b29c803a3e743808ca285e95b380b1378321dca2dff5742423246

  • SHA512

    e992fc742f4e2abe44d70618aa39e859cdd09b894aaab0724e9e33d377f7125fbdeb7a8f469f48a0abe213c5658d4c1b1da698d0ab70c0477abafa95e78882ac

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    silverlinehospital.in
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Bukky101@

Targets

    • Target

      114d29dfb63b29c803a3e743808ca285e95b380b1378321dca2dff5742423246

    • Size

      1.4MB

    • MD5

      2b6e2751a6f1baf22c14eab5554cfcda

    • SHA1

      c5afbbcca8d59850427aff8823ca6169670a5fe5

    • SHA256

      114d29dfb63b29c803a3e743808ca285e95b380b1378321dca2dff5742423246

    • SHA512

      e992fc742f4e2abe44d70618aa39e859cdd09b894aaab0724e9e33d377f7125fbdeb7a8f469f48a0abe213c5658d4c1b1da698d0ab70c0477abafa95e78882ac

    • Phoenix Keylogger

      Phoenix is a keylogger and info stealer first seen in July 2019.

    • Phoenix Keylogger Payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks