General

  • Target

    8312330a7af6285df32b764904215dbcc60d866f7b9bd51ed4684ff116cacc93

  • Size

    1.1MB

  • Sample

    220701-eghx8ababl

  • MD5

    7a69738eca7c2dd89114e860ddc49dd9

  • SHA1

    e6d8c5792a711c7ce6d9194e62e4760b09ed3a48

  • SHA256

    8312330a7af6285df32b764904215dbcc60d866f7b9bd51ed4684ff116cacc93

  • SHA512

    c993ced7802f0068526854c401b021afab493e47db5728e119d717fb092503f8b15337882f0d4dc37b5c524b690ada83b7164d47b40aba4df1c32493bd65c536

Malware Config

Targets

    • Target

      8312330a7af6285df32b764904215dbcc60d866f7b9bd51ed4684ff116cacc93

    • Size

      1.1MB

    • MD5

      7a69738eca7c2dd89114e860ddc49dd9

    • SHA1

      e6d8c5792a711c7ce6d9194e62e4760b09ed3a48

    • SHA256

      8312330a7af6285df32b764904215dbcc60d866f7b9bd51ed4684ff116cacc93

    • SHA512

      c993ced7802f0068526854c401b021afab493e47db5728e119d717fb092503f8b15337882f0d4dc37b5c524b690ada83b7164d47b40aba4df1c32493bd65c536

    • Phoenix Keylogger

      Phoenix is a keylogger and info stealer first seen in July 2019.

    • Phoenix Keylogger Payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks