General

  • Target

    bce9a96a4a27ae4cdc4ffd84249b7e6e075810952120874f6dbebc39d586bb3e

  • Size

    707KB

  • Sample

    220731-hr4jfseecp

  • MD5

    8583911291b5a5fa27f0930d403e8128

  • SHA1

    a88e96b6c8cab8106c812b1aa3853f3c60c7f153

  • SHA256

    bce9a96a4a27ae4cdc4ffd84249b7e6e075810952120874f6dbebc39d586bb3e

  • SHA512

    d2740da3d3e95cdf01a685e70f85bf6445896c1005ab9da4f22bff6e0c57163d8ffbc6f23597622efa314b7a89c5a7c42f9bd991b96bfb03d4aec744f6b23663

Malware Config

Targets

    • Target

      bce9a96a4a27ae4cdc4ffd84249b7e6e075810952120874f6dbebc39d586bb3e

    • Size

      707KB

    • MD5

      8583911291b5a5fa27f0930d403e8128

    • SHA1

      a88e96b6c8cab8106c812b1aa3853f3c60c7f153

    • SHA256

      bce9a96a4a27ae4cdc4ffd84249b7e6e075810952120874f6dbebc39d586bb3e

    • SHA512

      d2740da3d3e95cdf01a685e70f85bf6445896c1005ab9da4f22bff6e0c57163d8ffbc6f23597622efa314b7a89c5a7c42f9bd991b96bfb03d4aec744f6b23663

    • Phoenix Keylogger

      Phoenix is a keylogger and info stealer first seen in July 2019.

    • Phoenix Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks