Analysis

  • max time kernel
    93s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 19:40

General

  • Target

    fa2cf1ead7cfcade54c4ca2821add11ed086ee4d0c0a78cf189dd761f503cf8b.exe

  • Size

    747KB

  • MD5

    83521879ee5baef4ac67cb7c8aaa30fc

  • SHA1

    ef643c08bbf2533fb29dc80621cc6165089c36ff

  • SHA256

    fa2cf1ead7cfcade54c4ca2821add11ed086ee4d0c0a78cf189dd761f503cf8b

  • SHA512

    6ec7c06cb9e0721171253939d5436f8e55ef242283002a00514281657cd086228e2b8ea22c0203180cf8962d827ed7f80a1a849e1fec3e5b000742ba551dde56

  • SSDEEP

    12288:mWWzIRlRn2/rw7INjVGCXZq0iiIxT75TQdIJWjI0g0A8+C5RRRRRRRRRRRRRRRRA:mWUWrnIrw7I1VGCXZbiiOQdAWngR8rRy

Malware Config

Signatures

  • PhoenixStealer

    PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

  • Phoenixstealer family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa2cf1ead7cfcade54c4ca2821add11ed086ee4d0c0a78cf189dd761f503cf8b.exe
    "C:\Users\Admin\AppData\Local\Temp\fa2cf1ead7cfcade54c4ca2821add11ed086ee4d0c0a78cf189dd761f503cf8b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads