General
-
Target
1decc5cefbd3f7aaabbc916d509a8e6a16fdeb73f7dbb30bc0f02d33851d78c1
-
Size
122KB
-
Sample
220612-2x4wysaegr
-
MD5
1d304bf7ea19ce9b7b4ecd05f430213c
-
SHA1
62d544bcc9db7b95bd2774b7ae2663697ba4f23a
-
SHA256
1decc5cefbd3f7aaabbc916d509a8e6a16fdeb73f7dbb30bc0f02d33851d78c1
-
SHA512
635182105977f3653e249235d458387d0aa6881ac8879b9fbdca2ce275a0cf9cb6d3e846a801a4f13821f115a57bfd2c3b1545c58a7d3f94b9fd14ef3a7d88ae
Static task
static1
Behavioral task
behavioral1
Sample
1decc5cefbd3f7aaabbc916d509a8e6a16fdeb73f7dbb30bc0f02d33851d78c1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1decc5cefbd3f7aaabbc916d509a8e6a16fdeb73f7dbb30bc0f02d33851d78c1.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
1decc5cefbd3f7aaabbc916d509a8e6a16fdeb73f7dbb30bc0f02d33851d78c1
-
Size
122KB
-
MD5
1d304bf7ea19ce9b7b4ecd05f430213c
-
SHA1
62d544bcc9db7b95bd2774b7ae2663697ba4f23a
-
SHA256
1decc5cefbd3f7aaabbc916d509a8e6a16fdeb73f7dbb30bc0f02d33851d78c1
-
SHA512
635182105977f3653e249235d458387d0aa6881ac8879b9fbdca2ce275a0cf9cb6d3e846a801a4f13821f115a57bfd2c3b1545c58a7d3f94b9fd14ef3a7d88ae
Score10/10-
Phoenix Keylogger Payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-