General

  • Target

    fa87726e01ffeaf9cb327ca15b60d402f9c2c571d0a7a263305abb7add131a31

  • Size

    1.1MB

  • Sample

    220724-sjrj2ageak

  • MD5

    6f5a68e230a18ec6faa7c048a2bfc38c

  • SHA1

    8a979fed6645e37cd477e53b8ff2dd166f0f1e9d

  • SHA256

    fa87726e01ffeaf9cb327ca15b60d402f9c2c571d0a7a263305abb7add131a31

  • SHA512

    51f910f6b7fdc377156c2c0b9cbc9cf006d33d18974ef5eb2cf58bd58225151aee585e469d6d8fb726306a1cec0f046ac772b287d2efc74a0c8f98ebea49c735

Malware Config

Targets

    • Target

      fa87726e01ffeaf9cb327ca15b60d402f9c2c571d0a7a263305abb7add131a31

    • Size

      1.1MB

    • MD5

      6f5a68e230a18ec6faa7c048a2bfc38c

    • SHA1

      8a979fed6645e37cd477e53b8ff2dd166f0f1e9d

    • SHA256

      fa87726e01ffeaf9cb327ca15b60d402f9c2c571d0a7a263305abb7add131a31

    • SHA512

      51f910f6b7fdc377156c2c0b9cbc9cf006d33d18974ef5eb2cf58bd58225151aee585e469d6d8fb726306a1cec0f046ac772b287d2efc74a0c8f98ebea49c735

    • Phoenix Keylogger

      Phoenix is a keylogger and info stealer first seen in July 2019.

    • Phoenix Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Collection

Email Collection

1
T1114

Tasks