General
-
Target
5a60de044c16784f219f6c5500c105ef06bdc00975a1518a5a73f90ca2bdc68a
-
Size
122KB
-
Sample
220802-eaxssshdh2
-
MD5
1e3ea34762c6301233da7cb8c5e9c45f
-
SHA1
3d629e220c508ad7af102ef115d5eb3f3ec232f5
-
SHA256
5a60de044c16784f219f6c5500c105ef06bdc00975a1518a5a73f90ca2bdc68a
-
SHA512
8eab05ab8e033b1f1b20103a5da38a116e321a7f9344c26f6f8060865f4ef3e6ef1095aa0f2909f6ee1e9dca98f50dfbe7cd69cf2962f6dd59125fd80461759d
Static task
static1
Behavioral task
behavioral1
Sample
5a60de044c16784f219f6c5500c105ef06bdc00975a1518a5a73f90ca2bdc68a.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5a60de044c16784f219f6c5500c105ef06bdc00975a1518a5a73f90ca2bdc68a.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
5a60de044c16784f219f6c5500c105ef06bdc00975a1518a5a73f90ca2bdc68a
-
Size
122KB
-
MD5
1e3ea34762c6301233da7cb8c5e9c45f
-
SHA1
3d629e220c508ad7af102ef115d5eb3f3ec232f5
-
SHA256
5a60de044c16784f219f6c5500c105ef06bdc00975a1518a5a73f90ca2bdc68a
-
SHA512
8eab05ab8e033b1f1b20103a5da38a116e321a7f9344c26f6f8060865f4ef3e6ef1095aa0f2909f6ee1e9dca98f50dfbe7cd69cf2962f6dd59125fd80461759d
Score10/10-
Phoenix Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-