General

  • Target

    2e985b0c83bbdd94ea5cb2b5233bacbebcb990ccd5f0dde29228ff5aaf8d35fa

  • Size

    1.1MB

  • Sample

    220622-jpf6taahek

  • MD5

    4af0e440292dbccf2ee7fc82b2524937

  • SHA1

    f4f14fa34573b310a7341b1cc6993c506abfe5d0

  • SHA256

    2e985b0c83bbdd94ea5cb2b5233bacbebcb990ccd5f0dde29228ff5aaf8d35fa

  • SHA512

    e4bae673a41e431c5cf62010bd447cb11368d387f3d7dae4975d3973c07fa6b945e784d2e504cad6a7f2d1e233ccba0d65028e27f0f23888c09078180b83c580

Malware Config

Targets

    • Target

      2e985b0c83bbdd94ea5cb2b5233bacbebcb990ccd5f0dde29228ff5aaf8d35fa

    • Size

      1.1MB

    • MD5

      4af0e440292dbccf2ee7fc82b2524937

    • SHA1

      f4f14fa34573b310a7341b1cc6993c506abfe5d0

    • SHA256

      2e985b0c83bbdd94ea5cb2b5233bacbebcb990ccd5f0dde29228ff5aaf8d35fa

    • SHA512

      e4bae673a41e431c5cf62010bd447cb11368d387f3d7dae4975d3973c07fa6b945e784d2e504cad6a7f2d1e233ccba0d65028e27f0f23888c09078180b83c580

    • Phoenix Keylogger

      Phoenix is a keylogger and info stealer first seen in July 2019.

    • Phoenix Keylogger Payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Collection

Email Collection

1
T1114

Tasks