Analysis

  • max time kernel
    39s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    27-05-2022 16:13

General

  • Target

    05f2998f7139af7d96b1014b08d40261425febd19a78188f1e0b0570fa6ead6b.exe

  • Size

    545KB

  • MD5

    448d369bc58c44a93f49b0b2cfc5fa0a

  • SHA1

    bd571b994b3074ecc6cddf4383773af444621b5c

  • SHA256

    05f2998f7139af7d96b1014b08d40261425febd19a78188f1e0b0570fa6ead6b

  • SHA512

    bdeca441e1f0cb41519281fe127d82bdee25ade3d31d9485f8f6d8b2c2f21be56b553b11320cd475d9af89ce1305bf1e059e425c20b5e7d8537edb5f34c610cc

Score
10/10

Malware Config

Signatures

  • PhoenixStealer

    PhoenixStealer is an information stealer written in the C++, it sends the stolen information to cybercriminals.

Processes

  • C:\Users\Admin\AppData\Local\Temp\05f2998f7139af7d96b1014b08d40261425febd19a78188f1e0b0570fa6ead6b.exe
    "C:\Users\Admin\AppData\Local\Temp\05f2998f7139af7d96b1014b08d40261425febd19a78188f1e0b0570fa6ead6b.exe"
    1⤵
      PID:1664

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1664-54-0x00000000754A1000-0x00000000754A3000-memory.dmp
      Filesize

      8KB