MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 00926795599d6af73ade5d42b97d88a487024f3169dd625bf20d213a6a3ecba3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PhoenixStealer


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 00926795599d6af73ade5d42b97d88a487024f3169dd625bf20d213a6a3ecba3
SHA3-384 hash: 07fa19e30fd2465833fffdd4983fded9f9fa996e3e942cae17b2fe748b15a4e3bc865ae2b000fcac460b1e2e21bbcda6
SHA1 hash: 5127962f1fa9cfbd652d59575d1466dd673dfcc7
MD5 hash: 428ec9e689b020e46b7b5432bd6dd758
humanhash: echo-beer-lamp-table
File name:1.bin
Download: download sample
Signature PhoenixStealer
File size:1'872'792 bytes
First seen:2022-07-17 15:49:46 UTC
Last seen:2022-07-17 16:41:36 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash da0a8429d07681e0f845d1d4f08ae833 (28 x RedLineStealer, 2 x ArkeiStealer, 1 x PhoenixStealer)
ssdeep 24576:QlA3ZMDU8YqY4TRJi6ZMKNdokTzzAzbG1OL6KGducfXJsr0fcs2kHIaJ+aI3Nzr+:QlqCD7HXAXGVCcfXJsABl+aI3NzrYL
TLSH T1F8859D39EB4719B4DA17A3B1859EEB3B9B14B5248022AF7FFF0EEB0C64330126C95155
TrID 36.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
23.5% (.EXE) Win64 Executable (generic) (10523/12/4)
11.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.0% (.EXE) Win32 Executable (generic) (4505/5/1)
4.5% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter KdssSupport
Tags:exe PhoenixStealer


Avatar
KdssSupport
Uploaded with API

Intelligence


File Origin
# of uploads :
2
# of downloads :
313
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Atom.zip
Verdict:
Malicious activity
Analysis date:
2022-07-17 13:36:03 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a file in the system32 subdirectories
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionGetTickCount
EvasionQueryPerformanceCounter
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Panda Stealer, Phoenix Stealer
Detection:
malicious
Classification:
evad.troj.spyw
Score:
96 / 100
Signature
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Writes to foreign memory regions
Yara detected Panda Stealer
Yara detected Phoenix Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Convagent
Status:
Malicious
First seen:
2022-07-17 15:50:10 UTC
File Type:
PE (Exe)
AV detection:
22 of 26 (84.62%)
Threat level:
  5/5
Result
Malware family:
phoenixstealer
Score:
  10/10
Tags:
family:phoenixstealer stealer
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
PhoenixStealer
Unpacked files
SH256 hash:
6dce81d9b046513940ea866e9398ec06c42f251f627f601f83ca112dc6158068
MD5 hash:
46e92210e279c4531a543ed27d0910f6
SHA1 hash:
949e3fe9660737e4b919900906dd3a4aebcbff11
SH256 hash:
00926795599d6af73ade5d42b97d88a487024f3169dd625bf20d213a6a3ecba3
MD5 hash:
428ec9e689b020e46b7b5432bd6dd758
SHA1 hash:
5127962f1fa9cfbd652d59575d1466dd673dfcc7
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PhoenixStealer

Executable exe 00926795599d6af73ade5d42b97d88a487024f3169dd625bf20d213a6a3ecba3

(this sample)

  
Delivery method
Distributed via web download

Comments