General
-
Target
21780b952189ccfb91fd35963d08aea3bb970da39052c9615fcdbf173dfaa577
-
Size
1.1MB
-
Sample
220612-kegj9shgf3
-
MD5
c3e4da6ab5aeea86e7410d5cf7591dc4
-
SHA1
3050f604b87fa992429c2341e8f0c85f770ec80d
-
SHA256
21780b952189ccfb91fd35963d08aea3bb970da39052c9615fcdbf173dfaa577
-
SHA512
8b318c0f846d55ae9dff5cff7d8d8414fafef1a75594aaa68d378154f54a58b4a70475b9f4bd25c7f669e941ace921ecc09fd6570e8283427215b92915c370ad
Static task
static1
Behavioral task
behavioral1
Sample
21780b952189ccfb91fd35963d08aea3bb970da39052c9615fcdbf173dfaa577.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
21780b952189ccfb91fd35963d08aea3bb970da39052c9615fcdbf173dfaa577.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
Protocol: smtp- Host:
silverlinehospital.in - Port:
587 - Username:
[email protected] - Password:
Bukky101@
Targets
-
-
Target
21780b952189ccfb91fd35963d08aea3bb970da39052c9615fcdbf173dfaa577
-
Size
1.1MB
-
MD5
c3e4da6ab5aeea86e7410d5cf7591dc4
-
SHA1
3050f604b87fa992429c2341e8f0c85f770ec80d
-
SHA256
21780b952189ccfb91fd35963d08aea3bb970da39052c9615fcdbf173dfaa577
-
SHA512
8b318c0f846d55ae9dff5cff7d8d8414fafef1a75594aaa68d378154f54a58b4a70475b9f4bd25c7f669e941ace921ecc09fd6570e8283427215b92915c370ad
Score10/10-
Phoenix Keylogger Payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-