General

  • Target

    24fe67e5b75b240e8bc12d76fe5b1e42.exe

  • Size

    34KB

  • Sample

    201230-r942tjcd4a

  • MD5

    24fe67e5b75b240e8bc12d76fe5b1e42

  • SHA1

    f5d4f5967a4daa68cc5a9b5323baffd3bc8d3c1d

  • SHA256

    7e663d31d2d1fb89bb88dfa65fea415d754e5a9e6d804cf99c59d98f95580945

  • SHA512

    a605227ea20c041cffe26740a6f56ca45823e3450a7945d636af890b7162a16be88aa766c7347a55199f4b43b83493a089a91d53bde69ef3099670a47497f6b5

Malware Config

Targets

    • Target

      24fe67e5b75b240e8bc12d76fe5b1e42.exe

    • Size

      34KB

    • MD5

      24fe67e5b75b240e8bc12d76fe5b1e42

    • SHA1

      f5d4f5967a4daa68cc5a9b5323baffd3bc8d3c1d

    • SHA256

      7e663d31d2d1fb89bb88dfa65fea415d754e5a9e6d804cf99c59d98f95580945

    • SHA512

      a605227ea20c041cffe26740a6f56ca45823e3450a7945d636af890b7162a16be88aa766c7347a55199f4b43b83493a089a91d53bde69ef3099670a47497f6b5

    • Phorphiex Payload

    • Phorphiex Worm

      Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

3
T1112

Tasks