General

  • Target

    9a50980afb1c6a43cf38872e694bb7db.exe

  • Size

    37KB

  • Sample

    210204-elntdgc8dn

  • MD5

    9a50980afb1c6a43cf38872e694bb7db

  • SHA1

    237aa3ee8c912e6f8326782b790327562cef8dd9

  • SHA256

    78bb6fe6bde75a9ba11d0d2f69306619290f90aa94448d6aa4da340d2144e1cb

  • SHA512

    fe6aaba3f46b1f2b73899b3dc92865fd803c2415bc80ecc6c07a7efd613b41ba34a4fa8c515c25b43bf3a83e37f688f9655f5668da1d54ffc1fc0f103ec7d9b8

Malware Config

Targets

    • Target

      9a50980afb1c6a43cf38872e694bb7db.exe

    • Size

      37KB

    • MD5

      9a50980afb1c6a43cf38872e694bb7db

    • SHA1

      237aa3ee8c912e6f8326782b790327562cef8dd9

    • SHA256

      78bb6fe6bde75a9ba11d0d2f69306619290f90aa94448d6aa4da340d2144e1cb

    • SHA512

      fe6aaba3f46b1f2b73899b3dc92865fd803c2415bc80ecc6c07a7efd613b41ba34a4fa8c515c25b43bf3a83e37f688f9655f5668da1d54ffc1fc0f103ec7d9b8

    • Phorphiex Payload

    • Phorphiex Worm

      Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

3
T1112

Tasks