Resubmissions

07-07-2022 07:47

220707-jmlnhshfc4 10

10-11-2021 17:33

211110-v4t7rsehgq 1

Analysis

  • max time kernel
    0s
  • max time network
    0s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    07-07-2022 07:47

General

  • Target

    Aer0 Spoofer - Stable .exe

  • Size

    546KB

  • MD5

    d25378d986ec34642de21513c95218e0

  • SHA1

    631bf00c986aa867d308135050ba0104ff4143d0

  • SHA256

    efc9deae21fc5b4c8ebfc3ecd56d62c5b5bf5f6cef0cfbdb250c3683f1e25eda

  • SHA512

    bb8cec754b4a67aabcb1a64ef6af8bbcff0f49058362c2717c85bbad21fbae8b63112612ef1739b9a375cced4b7d96f72965d924e0af67fc6144a2e25fbd92b3

Score
10/10

Malware Config

Signatures

  • PhoenixStealer

    PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Aer0 Spoofer - Stable .exe
    "C:\Users\Admin\AppData\Local\Temp\Aer0 Spoofer - Stable .exe"
    1⤵
      PID:1052

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1052-54-0x0000000076C81000-0x0000000076C83000-memory.dmp

      Filesize

      8KB