General
-
Target
5cdfb7506671b54ba2aa06ca79ed345b0f7454dc8376673c6928cbaa09d98243
-
Size
134KB
-
Sample
220801-fp1cxacafn
-
MD5
f832b862d9f25b28e4282e2a06f6eaab
-
SHA1
893a0728f6ebfb22fffc568a7f1480221234c464
-
SHA256
5cdfb7506671b54ba2aa06ca79ed345b0f7454dc8376673c6928cbaa09d98243
-
SHA512
3d2cee420ded5928bc269a0e82eb6e40d0e75f892c875c0afadca2252d54946c1742c68cbdc215a3c1d9cf5695a80aa785bddf8c6d23aaa25882bf916074dc42
Static task
static1
Behavioral task
behavioral1
Sample
5cdfb7506671b54ba2aa06ca79ed345b0f7454dc8376673c6928cbaa09d98243.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5cdfb7506671b54ba2aa06ca79ed345b0f7454dc8376673c6928cbaa09d98243.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
5cdfb7506671b54ba2aa06ca79ed345b0f7454dc8376673c6928cbaa09d98243
-
Size
134KB
-
MD5
f832b862d9f25b28e4282e2a06f6eaab
-
SHA1
893a0728f6ebfb22fffc568a7f1480221234c464
-
SHA256
5cdfb7506671b54ba2aa06ca79ed345b0f7454dc8376673c6928cbaa09d98243
-
SHA512
3d2cee420ded5928bc269a0e82eb6e40d0e75f892c875c0afadca2252d54946c1742c68cbdc215a3c1d9cf5695a80aa785bddf8c6d23aaa25882bf916074dc42
Score10/10-
Phoenix Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-