General
-
Target
ef886b4f433a603dfc4c7512a6f62188a8e5d6f0058b2481628195802f9de0ea
-
Size
124KB
-
Sample
220724-zqyp9agag5
-
MD5
1e75e1699136ce9903657fde0e375237
-
SHA1
efca63c7208753f7599774d6cc77ac5f294dd2d0
-
SHA256
ef886b4f433a603dfc4c7512a6f62188a8e5d6f0058b2481628195802f9de0ea
-
SHA512
7ecfea32ea6b6605b1d5a67b9660ad00951f51554d2fad9d2ffe19d8e42d194b6c961c1947107e7a78340838cf446f1f25520740db86aad687efb84dd102a4a3
Static task
static1
Behavioral task
behavioral1
Sample
ef886b4f433a603dfc4c7512a6f62188a8e5d6f0058b2481628195802f9de0ea.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
ef886b4f433a603dfc4c7512a6f62188a8e5d6f0058b2481628195802f9de0ea.exe
Resource
win10v2004-20220722-en
Malware Config
Targets
-
-
Target
ef886b4f433a603dfc4c7512a6f62188a8e5d6f0058b2481628195802f9de0ea
-
Size
124KB
-
MD5
1e75e1699136ce9903657fde0e375237
-
SHA1
efca63c7208753f7599774d6cc77ac5f294dd2d0
-
SHA256
ef886b4f433a603dfc4c7512a6f62188a8e5d6f0058b2481628195802f9de0ea
-
SHA512
7ecfea32ea6b6605b1d5a67b9660ad00951f51554d2fad9d2ffe19d8e42d194b6c961c1947107e7a78340838cf446f1f25520740db86aad687efb84dd102a4a3
Score10/10-
Phoenix Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-