General
-
Target
b8363d36701b3a635ce001132768a8383d7584b1080eab3859b8fcb839298e47
-
Size
1.1MB
-
Sample
220731-fxsm2abagl
-
MD5
3d315e60303af2100eb4482c8fb0c67c
-
SHA1
331b4db8d17f862524894839e92434d0281cb123
-
SHA256
b8363d36701b3a635ce001132768a8383d7584b1080eab3859b8fcb839298e47
-
SHA512
46fee4534f7be19c066696f94490854b18ad5d671712fd370d941f6a636e25e56a6c402249aadf72ae2fc976b4a48deca9f84f2b91a554e7ed5fe2a3d2deeea0
Static task
static1
Behavioral task
behavioral1
Sample
b8363d36701b3a635ce001132768a8383d7584b1080eab3859b8fcb839298e47.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
b8363d36701b3a635ce001132768a8383d7584b1080eab3859b8fcb839298e47.exe
Resource
win10v2004-20220722-en
Malware Config
Targets
-
-
Target
b8363d36701b3a635ce001132768a8383d7584b1080eab3859b8fcb839298e47
-
Size
1.1MB
-
MD5
3d315e60303af2100eb4482c8fb0c67c
-
SHA1
331b4db8d17f862524894839e92434d0281cb123
-
SHA256
b8363d36701b3a635ce001132768a8383d7584b1080eab3859b8fcb839298e47
-
SHA512
46fee4534f7be19c066696f94490854b18ad5d671712fd370d941f6a636e25e56a6c402249aadf72ae2fc976b4a48deca9f84f2b91a554e7ed5fe2a3d2deeea0
Score10/10-
Phoenix Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-