General
-
Target
3a7e74024c233663dc9b627117a4df291f5a413cc829b5282f090941254365ee
-
Size
1.1MB
-
Sample
220625-d14hlaefh9
-
MD5
f0a7a1ef68bf80596ec2048e4740cde2
-
SHA1
31ea4c2649c0f7d6ac86e277aee377a149df38b0
-
SHA256
3a7e74024c233663dc9b627117a4df291f5a413cc829b5282f090941254365ee
-
SHA512
324510cffabe2dc6a26dc7f52c645bff2946fe0de70c04204af1d7f575833562bc352a3a87b7c3048247c4e777c0b0c094d95b1843a6d31f02dcc415cd7f0eea
Static task
static1
Behavioral task
behavioral1
Sample
3a7e74024c233663dc9b627117a4df291f5a413cc829b5282f090941254365ee.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3a7e74024c233663dc9b627117a4df291f5a413cc829b5282f090941254365ee.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
3a7e74024c233663dc9b627117a4df291f5a413cc829b5282f090941254365ee
-
Size
1.1MB
-
MD5
f0a7a1ef68bf80596ec2048e4740cde2
-
SHA1
31ea4c2649c0f7d6ac86e277aee377a149df38b0
-
SHA256
3a7e74024c233663dc9b627117a4df291f5a413cc829b5282f090941254365ee
-
SHA512
324510cffabe2dc6a26dc7f52c645bff2946fe0de70c04204af1d7f575833562bc352a3a87b7c3048247c4e777c0b0c094d95b1843a6d31f02dcc415cd7f0eea
Score10/10-
Phoenix Keylogger Payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-