General

  • Target

    cfc6be807622eee92d19f4c79fbea4b8df263211c719ed828dfb0e28e5a13ae0

  • Size

    136KB

  • Sample

    220625-lfebzahab6

  • MD5

    35757bcb4ea329bb4091f13c08890b5d

  • SHA1

    071e81a9112d0abb467de15110326aad28eef7fb

  • SHA256

    cfc6be807622eee92d19f4c79fbea4b8df263211c719ed828dfb0e28e5a13ae0

  • SHA512

    4d445a3613406b762371de41a19e9a1ec1b490de818089899a20058d3e6e8a2e5f5b6720334b9b8946c3a3ed60837f4d4f1a6e61a8acd57dadd4be6a4d055a8b

Malware Config

Targets

    • Target

      cfc6be807622eee92d19f4c79fbea4b8df263211c719ed828dfb0e28e5a13ae0

    • Size

      136KB

    • MD5

      35757bcb4ea329bb4091f13c08890b5d

    • SHA1

      071e81a9112d0abb467de15110326aad28eef7fb

    • SHA256

      cfc6be807622eee92d19f4c79fbea4b8df263211c719ed828dfb0e28e5a13ae0

    • SHA512

      4d445a3613406b762371de41a19e9a1ec1b490de818089899a20058d3e6e8a2e5f5b6720334b9b8946c3a3ed60837f4d4f1a6e61a8acd57dadd4be6a4d055a8b

    • Phoenix Keylogger

      Phoenix is a keylogger and info stealer first seen in July 2019.

    • Phoenix Keylogger Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks