General

  • Target

    0a6569e45a3a38f7168f4c4aa0594627.exe

  • Size

    6KB

  • Sample

    210503-gtseqcfc1a

  • MD5

    0a6569e45a3a38f7168f4c4aa0594627

  • SHA1

    af8d33d98a8248f1e393337428a742929b02418f

  • SHA256

    ad74f606e358fb7f6db9a5652d0a60310d069ac108934a72d0352e5fa9248b38

  • SHA512

    f0e74357cff0bc9a9c91cc911a6e214ab0fb29d68ab3e51f766d6e77c0e16836402b3c7093d61b988e0eaa1415de8f0766c10164b8730897ffad5c530ce48f07

Malware Config

Targets

    • Target

      0a6569e45a3a38f7168f4c4aa0594627.exe

    • Size

      6KB

    • MD5

      0a6569e45a3a38f7168f4c4aa0594627

    • SHA1

      af8d33d98a8248f1e393337428a742929b02418f

    • SHA256

      ad74f606e358fb7f6db9a5652d0a60310d069ac108934a72d0352e5fa9248b38

    • SHA512

      f0e74357cff0bc9a9c91cc911a6e214ab0fb29d68ab3e51f766d6e77c0e16836402b3c7093d61b988e0eaa1415de8f0766c10164b8730897ffad5c530ce48f07

    • Phorphiex Payload

    • Phorphiex Worm

      Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

    • Windows security bypass

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

3
T1112

Tasks