General

  • Target

    c7cf7d0b57ec48df2c660cbaaa2f921a.exe

  • Size

    1.3MB

  • Sample

    201226-zlm4qqkdj2

  • MD5

    c7cf7d0b57ec48df2c660cbaaa2f921a

  • SHA1

    d0d508fdc7ae75868db9e7f1693982d066723a87

  • SHA256

    53cae19aa470b038966c47f8e7361fde1da99f4f54ea97ab3fb7198506ecbc3d

  • SHA512

    2d69e9e72f16ccea4e9353b50890f29ba9a870fda63e7650a98048caf8ae77ceb26cd939fd9a25806d43ee20f6ed55e175d3c3822337dc1be4aa807994306d71

Malware Config

Targets

    • Target

      c7cf7d0b57ec48df2c660cbaaa2f921a.exe

    • Size

      1.3MB

    • MD5

      c7cf7d0b57ec48df2c660cbaaa2f921a

    • SHA1

      d0d508fdc7ae75868db9e7f1693982d066723a87

    • SHA256

      53cae19aa470b038966c47f8e7361fde1da99f4f54ea97ab3fb7198506ecbc3d

    • SHA512

      2d69e9e72f16ccea4e9353b50890f29ba9a870fda63e7650a98048caf8ae77ceb26cd939fd9a25806d43ee20f6ed55e175d3c3822337dc1be4aa807994306d71

    • Phorphiex Payload

    • Phorphiex Worm

      Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

    • Windows security bypass

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

3
T1112

Tasks