General
-
Target
ddc1ca6b9cabf78dd490c8ac27ba16fdbf70dc481443e08d63c3a2edcbf6ad36
-
Size
1.1MB
-
Sample
220731-fxv36abahl
-
MD5
062320679a253df4d37961a6ce5b9870
-
SHA1
5e3d73c7d48d1b85deb28f1120e76a3a8fb683ae
-
SHA256
ddc1ca6b9cabf78dd490c8ac27ba16fdbf70dc481443e08d63c3a2edcbf6ad36
-
SHA512
fee1178d2155f147ad2d8b613dad35cd6323175c3bb20476a8a506ad68d0b05b6eb3d9779078554675bd420634aa82dd0bbf6205a222401625e2ff2419417f4d
Static task
static1
Behavioral task
behavioral1
Sample
ddc1ca6b9cabf78dd490c8ac27ba16fdbf70dc481443e08d63c3a2edcbf6ad36.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
ddc1ca6b9cabf78dd490c8ac27ba16fdbf70dc481443e08d63c3a2edcbf6ad36.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
Protocol: smtp- Host:
silverlinehospital.in - Port:
587 - Username:
[email protected] - Password:
Bukky101@
Targets
-
-
Target
ddc1ca6b9cabf78dd490c8ac27ba16fdbf70dc481443e08d63c3a2edcbf6ad36
-
Size
1.1MB
-
MD5
062320679a253df4d37961a6ce5b9870
-
SHA1
5e3d73c7d48d1b85deb28f1120e76a3a8fb683ae
-
SHA256
ddc1ca6b9cabf78dd490c8ac27ba16fdbf70dc481443e08d63c3a2edcbf6ad36
-
SHA512
fee1178d2155f147ad2d8b613dad35cd6323175c3bb20476a8a506ad68d0b05b6eb3d9779078554675bd420634aa82dd0bbf6205a222401625e2ff2419417f4d
Score10/10-
Phoenix Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-