General

  • Target

    bdc0968a6b40243c3b54fe554fa7567b.exe

  • Size

    67KB

  • Sample

    201128-3wsgzw9sva

  • MD5

    bdc0968a6b40243c3b54fe554fa7567b

  • SHA1

    49d48d747cfbe8310161600d2ae8c7a01f7c74cd

  • SHA256

    01b3da80517886f0b91023294da6be87ec44dd87eadc39b9141950fc54f96783

  • SHA512

    5d715b1334d816a06ab694aa7810e3b1fe56d729a387b2a95dfef6d17cdbf11a1e674d98784681e0d3b4fe752721b02c0d9826f74881027fcfd923cf0574871c

Malware Config

Targets

    • Target

      bdc0968a6b40243c3b54fe554fa7567b.exe

    • Size

      67KB

    • MD5

      bdc0968a6b40243c3b54fe554fa7567b

    • SHA1

      49d48d747cfbe8310161600d2ae8c7a01f7c74cd

    • SHA256

      01b3da80517886f0b91023294da6be87ec44dd87eadc39b9141950fc54f96783

    • SHA512

      5d715b1334d816a06ab694aa7810e3b1fe56d729a387b2a95dfef6d17cdbf11a1e674d98784681e0d3b4fe752721b02c0d9826f74881027fcfd923cf0574871c

    • Phorphiex Payload

    • Phorphiex Worm

      Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

3
T1112

Tasks