MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7dd02ed6230b0adde343aca84f8693a1c0d3ade225679849bf72849ad84107ca. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PhoenixKeylogger


Vendor detections: 6


Intelligence 6 IOCs YARA 3 File information Comments

SHA256 hash: 7dd02ed6230b0adde343aca84f8693a1c0d3ade225679849bf72849ad84107ca
SHA3-384 hash: 083c048ae5db7c64e2e44b87f207cd4cc094114b70e95f3cd28df7ac5dba00b9f9a6363bb7d1f742e6e92d7131151afa
SHA1 hash: 85aa97900ec84817ba7bfbf923b491bacfc3dbab
MD5 hash: 29752eef5f5a7a3a6c9d0bbd473d0576
humanhash: oxygen-hotel-south-may
File name:SMK8238-0028937.exe
Download: download sample
Signature PhoenixKeylogger
File size:642'560 bytes
First seen:2020-07-20 10:41:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 947a363cee796918c4dd5f0352950426 (5 x AgentTesla, 5 x Loki, 5 x MassLogger)
ssdeep 12288:wpxEDrQY5EvoFzhlmTS1i4jkkg52CKRC8fZ9G5CtyaK2p:oa8voVOIObYfZoTaKA
Threatray 2'602 similar samples on MalwareBazaar
TLSH EAD48F22F1E04877C1771A7C4D1B66A8A836BE103E3C9D766BE74C4CDF3A64134A52A7
Reporter abuse_ch
Tags:exe PhoenixKeylogger


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: metaltree.com.sg
Sending IP: 23.106.215.1
From: Helan Joseph <jl@metaltree.com.sg>
Subject: Re: Revised Purchase Order
Attachment: SMK8238-0028937.arj (contains "SMK8238-0028937.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
85
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-07-20 10:32:12 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx spyware
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious behavior: MapViewOfSection
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: MapViewOfSection
Suspicious behavior: RenamesItself
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Looks up external IP address via web service
Looks up external IP address via web service
Reads user/profile data of local email clients
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
UPX packed file
UPX packed file
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CAP_HookExKeylogger
Author:Brian C. Bell -- @biebsmalwareguy
Reference:https://github.com/DFIRnotes/rules/blob/master/CAP_HookExKeylogger.yar
Rule name:MAL_Envrial_Jan18_1
Author:Florian Roth
Description:Detects Encrial credential stealer malware
Reference:https://twitter.com/malwrhunterteam/status/953313514629853184
Rule name:win_404keylogger_g0
Author:Slavo Greminger, SWITCH-CERT, Daniel Plohmann <daniel.plohmann<at>fkie.fraunhofer.de>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

PhoenixKeylogger

Executable exe 7dd02ed6230b0adde343aca84f8693a1c0d3ade225679849bf72849ad84107ca

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments