IOC Report
phish_alert_sp2_2.0.0.0.eml

loading gif

Files

File Path
Type
Category
Malicious
phish_alert_sp2_2.0.0.0.eml
RFC 822 mail, ASCII text, with very long lines (2049), with CRLF line terminators
initial sample
C:\Users\user\Documents\Outlook Files\Outlook Data File - NoEmail.pst
Microsoft Outlook email folder (>=2003)
dropped
malicious
C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\F9EB7AF4-4FA2-480F-BFB2-4F33EA212BD9
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Office\OTele\outlook.exe.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\OTele\outlook.exe.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Temp\Diagnostics\OUTLOOK\App1730113968980643300_5C7C7BA2-7A0E-49D6-861E-2F171D20D135.log
ASCII text, with very long lines (28766), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Diagnostics\OUTLOOK\App1730113968981515400_5C7C7BA2-7A0E-49D6-861E-2F171D20D135.log
data
dropped
C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241028T0712480729-3508.etl
data
modified
C:\Users\user\AppData\Roaming\Microsoft\Office\MSO3072.acl
data
modified

IPs

IP
Domain
Country
Malicious
52.113.194.132
unknown
United States
104.208.16.92
unknown
United States
52.109.32.97
unknown
United States