General

  • Target

    f4d7d721f68bc9a80aaf53bc184a3c58.exe

  • Size

    35KB

  • Sample

    201201-4xmjh4d4jj

  • MD5

    f4d7d721f68bc9a80aaf53bc184a3c58

  • SHA1

    9e8a43f4c8d4c84a96496c5805835cd383a664fb

  • SHA256

    7fff83cae8e0c8848bfdef443f51b5caea1474814c5d1691f0ccf0f3bcd7392a

  • SHA512

    30cf8a555438b35a829471a59f5d5a5e85d65c83f2982cb78b7e6a48e55ad19a082011fce392a3d52090f5b0c447ee415097fe11cec9b83cc59229bd55069833

Malware Config

Targets

    • Target

      f4d7d721f68bc9a80aaf53bc184a3c58.exe

    • Size

      35KB

    • MD5

      f4d7d721f68bc9a80aaf53bc184a3c58

    • SHA1

      9e8a43f4c8d4c84a96496c5805835cd383a664fb

    • SHA256

      7fff83cae8e0c8848bfdef443f51b5caea1474814c5d1691f0ccf0f3bcd7392a

    • SHA512

      30cf8a555438b35a829471a59f5d5a5e85d65c83f2982cb78b7e6a48e55ad19a082011fce392a3d52090f5b0c447ee415097fe11cec9b83cc59229bd55069833

    • Phorphiex Payload

    • Phorphiex Worm

      Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

3
T1112

Tasks