General
-
Target
8312330a7af6285df32b764904215dbcc60d866f7b9bd51ed4684ff116cacc93
-
Size
1.1MB
-
Sample
220701-eghx8ababl
-
MD5
7a69738eca7c2dd89114e860ddc49dd9
-
SHA1
e6d8c5792a711c7ce6d9194e62e4760b09ed3a48
-
SHA256
8312330a7af6285df32b764904215dbcc60d866f7b9bd51ed4684ff116cacc93
-
SHA512
c993ced7802f0068526854c401b021afab493e47db5728e119d717fb092503f8b15337882f0d4dc37b5c524b690ada83b7164d47b40aba4df1c32493bd65c536
Static task
static1
Behavioral task
behavioral1
Sample
8312330a7af6285df32b764904215dbcc60d866f7b9bd51ed4684ff116cacc93.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8312330a7af6285df32b764904215dbcc60d866f7b9bd51ed4684ff116cacc93.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
8312330a7af6285df32b764904215dbcc60d866f7b9bd51ed4684ff116cacc93
-
Size
1.1MB
-
MD5
7a69738eca7c2dd89114e860ddc49dd9
-
SHA1
e6d8c5792a711c7ce6d9194e62e4760b09ed3a48
-
SHA256
8312330a7af6285df32b764904215dbcc60d866f7b9bd51ed4684ff116cacc93
-
SHA512
c993ced7802f0068526854c401b021afab493e47db5728e119d717fb092503f8b15337882f0d4dc37b5c524b690ada83b7164d47b40aba4df1c32493bd65c536
Score10/10-
Phoenix Keylogger Payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-