General

  • Target

    b8363d36701b3a635ce001132768a8383d7584b1080eab3859b8fcb839298e47

  • Size

    1.1MB

  • Sample

    220731-fxsm2abagl

  • MD5

    3d315e60303af2100eb4482c8fb0c67c

  • SHA1

    331b4db8d17f862524894839e92434d0281cb123

  • SHA256

    b8363d36701b3a635ce001132768a8383d7584b1080eab3859b8fcb839298e47

  • SHA512

    46fee4534f7be19c066696f94490854b18ad5d671712fd370d941f6a636e25e56a6c402249aadf72ae2fc976b4a48deca9f84f2b91a554e7ed5fe2a3d2deeea0

Malware Config

Targets

    • Target

      b8363d36701b3a635ce001132768a8383d7584b1080eab3859b8fcb839298e47

    • Size

      1.1MB

    • MD5

      3d315e60303af2100eb4482c8fb0c67c

    • SHA1

      331b4db8d17f862524894839e92434d0281cb123

    • SHA256

      b8363d36701b3a635ce001132768a8383d7584b1080eab3859b8fcb839298e47

    • SHA512

      46fee4534f7be19c066696f94490854b18ad5d671712fd370d941f6a636e25e56a6c402249aadf72ae2fc976b4a48deca9f84f2b91a554e7ed5fe2a3d2deeea0

    • Phoenix Keylogger

      Phoenix is a keylogger and info stealer first seen in July 2019.

    • Phoenix Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks