Resubmissions

07-07-2022 07:46

220707-jmcqlshfa9 10

01-11-2021 13:17

211101-qjdbashhg2 1

Analysis

  • max time kernel
    0s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    07-07-2022 07:46

General

  • Target

    7c6be662e016b02ac9e7a44966301ea70b365e5ca38d9ebb493544a186083349.exe

  • Size

    747KB

  • MD5

    531c4bd7531cd5ccc602f2e7d33c0be8

  • SHA1

    abf11d1ceaa7d28486ca2e9864b4e75bf9d7de07

  • SHA256

    7c6be662e016b02ac9e7a44966301ea70b365e5ca38d9ebb493544a186083349

  • SHA512

    5459f97318408b633df873c37858db9c451fffc1008184a33e89118842a851ca70a99920d60c29b315c4b76caea5226bfc0dc52b3d55300a63787d221f4fec30

Score
10/10

Malware Config

Signatures

  • PhoenixStealer

    PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c6be662e016b02ac9e7a44966301ea70b365e5ca38d9ebb493544a186083349.exe
    "C:\Users\Admin\AppData\Local\Temp\7c6be662e016b02ac9e7a44966301ea70b365e5ca38d9ebb493544a186083349.exe"
    1⤵
      PID:2024

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2024-54-0x0000000076011000-0x0000000076013000-memory.dmp

      Filesize

      8KB