General
-
Target
cfc6be807622eee92d19f4c79fbea4b8df263211c719ed828dfb0e28e5a13ae0
-
Size
136KB
-
Sample
220625-lfebzahab6
-
MD5
35757bcb4ea329bb4091f13c08890b5d
-
SHA1
071e81a9112d0abb467de15110326aad28eef7fb
-
SHA256
cfc6be807622eee92d19f4c79fbea4b8df263211c719ed828dfb0e28e5a13ae0
-
SHA512
4d445a3613406b762371de41a19e9a1ec1b490de818089899a20058d3e6e8a2e5f5b6720334b9b8946c3a3ed60837f4d4f1a6e61a8acd57dadd4be6a4d055a8b
Static task
static1
Behavioral task
behavioral1
Sample
cfc6be807622eee92d19f4c79fbea4b8df263211c719ed828dfb0e28e5a13ae0.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
cfc6be807622eee92d19f4c79fbea4b8df263211c719ed828dfb0e28e5a13ae0.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
cfc6be807622eee92d19f4c79fbea4b8df263211c719ed828dfb0e28e5a13ae0
-
Size
136KB
-
MD5
35757bcb4ea329bb4091f13c08890b5d
-
SHA1
071e81a9112d0abb467de15110326aad28eef7fb
-
SHA256
cfc6be807622eee92d19f4c79fbea4b8df263211c719ed828dfb0e28e5a13ae0
-
SHA512
4d445a3613406b762371de41a19e9a1ec1b490de818089899a20058d3e6e8a2e5f5b6720334b9b8946c3a3ed60837f4d4f1a6e61a8acd57dadd4be6a4d055a8b
Score10/10-
Phoenix Keylogger Payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-