General

  • Target

    0a052eff71641ff91897af5bdecb4a98ed3cb32bcb6ff86c4396b1e3ceee0184.zip

  • Size

    119KB

  • Sample

    210512-16scnb6wx6

  • MD5

    eb0894f2e26bd211450851e114f41543

  • SHA1

    948b78f3f4a92733b05ba65ffea004c6a8b996ba

  • SHA256

    5c2e10388549c3dcc510874f71d4ffb13692b1bbdc5fc06a98e0f3f643302239

  • SHA512

    2d8a3927aeeaf2b37cda50614d1b45a34eb0cbe1268cc84ee7d187ddc4a095f048f5529db3d04592e5d54096a39b6705f5df532698caeffc30741c4f316473aa

Malware Config

Targets

    • Target

      0a052eff71641ff91897af5bdecb4a98ed3cb32bcb6ff86c4396b1e3ceee0184.exe

    • Size

      949KB

    • MD5

      1daca30b2b6c0ef60e02df04e656e990

    • SHA1

      c1f6f1e1a27e7be32a3f18440c05951fa7e52eb9

    • SHA256

      0a052eff71641ff91897af5bdecb4a98ed3cb32bcb6ff86c4396b1e3ceee0184

    • SHA512

      7f547f46e21ffe3c764050b081621c5df5046be118eb2765e546ce3fa3c3ed7541dbe0dc4deca85c682a1122d78a528614eac6c6684adcfae5e2f215f3651b52

    • Modifies Windows Defender Real-time Protection settings

    • Phorphiex Payload

    • Phorphiex Worm

      Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

4
T1112

Disabling Security Tools

3
T1089

Tasks