General
-
Target
fa87726e01ffeaf9cb327ca15b60d402f9c2c571d0a7a263305abb7add131a31
-
Size
1.1MB
-
Sample
220724-sjrj2ageak
-
MD5
6f5a68e230a18ec6faa7c048a2bfc38c
-
SHA1
8a979fed6645e37cd477e53b8ff2dd166f0f1e9d
-
SHA256
fa87726e01ffeaf9cb327ca15b60d402f9c2c571d0a7a263305abb7add131a31
-
SHA512
51f910f6b7fdc377156c2c0b9cbc9cf006d33d18974ef5eb2cf58bd58225151aee585e469d6d8fb726306a1cec0f046ac772b287d2efc74a0c8f98ebea49c735
Static task
static1
Behavioral task
behavioral1
Sample
fa87726e01ffeaf9cb327ca15b60d402f9c2c571d0a7a263305abb7add131a31.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
fa87726e01ffeaf9cb327ca15b60d402f9c2c571d0a7a263305abb7add131a31.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
fa87726e01ffeaf9cb327ca15b60d402f9c2c571d0a7a263305abb7add131a31
-
Size
1.1MB
-
MD5
6f5a68e230a18ec6faa7c048a2bfc38c
-
SHA1
8a979fed6645e37cd477e53b8ff2dd166f0f1e9d
-
SHA256
fa87726e01ffeaf9cb327ca15b60d402f9c2c571d0a7a263305abb7add131a31
-
SHA512
51f910f6b7fdc377156c2c0b9cbc9cf006d33d18974ef5eb2cf58bd58225151aee585e469d6d8fb726306a1cec0f046ac772b287d2efc74a0c8f98ebea49c735
Score10/10-
Phoenix Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-