General

  • Target

    dcba6db4d94eaa0caff01673d47930c53d3ccd4fe793c09e12547ac5d53b2d0a

  • Size

    1.1MB

  • Sample

    220731-fxt6vsaaf2

  • MD5

    90f569dce5e7b2e2375f00feb6e183a2

  • SHA1

    1d5388ab49868acc57f1e1e3bbbdb8b10204fba5

  • SHA256

    dcba6db4d94eaa0caff01673d47930c53d3ccd4fe793c09e12547ac5d53b2d0a

  • SHA512

    2cbc66a7aac5f72ff0cd40b5b486526786178d445d73efa612698636360a262b15ca3d5d3d62258a7bfe79cbda0532c20b9f55bae0eed533b932b9f34191c928

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    bhavnatutor.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Onyeoba111

Targets

    • Target

      dcba6db4d94eaa0caff01673d47930c53d3ccd4fe793c09e12547ac5d53b2d0a

    • Size

      1.1MB

    • MD5

      90f569dce5e7b2e2375f00feb6e183a2

    • SHA1

      1d5388ab49868acc57f1e1e3bbbdb8b10204fba5

    • SHA256

      dcba6db4d94eaa0caff01673d47930c53d3ccd4fe793c09e12547ac5d53b2d0a

    • SHA512

      2cbc66a7aac5f72ff0cd40b5b486526786178d445d73efa612698636360a262b15ca3d5d3d62258a7bfe79cbda0532c20b9f55bae0eed533b932b9f34191c928

    • Phoenix Keylogger

      Phoenix is a keylogger and info stealer first seen in July 2019.

    • Phoenix Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks