General

  • Target

    92ec0ad5172f3a97d6656b70c111af98.exe

  • Size

    7KB

  • Sample

    210524-bclpja7xbe

  • MD5

    92ec0ad5172f3a97d6656b70c111af98

  • SHA1

    e15fc1668ccdaf70e5831906191f611136b7ac65

  • SHA256

    5e31f3d2ad06413f4c3824c6bbe56cf7dffda38cec5bd1b2c0c377718a11297c

  • SHA512

    f895ac70eb9c68b9361b32d71c3135f3ccd2f7b676d03061677416b883a1be7a8bad85df8de8202f612ebdfa8564ce77d34f7d5eb9a818fac0098cb4ca856762

Malware Config

Targets

    • Target

      92ec0ad5172f3a97d6656b70c111af98.exe

    • Size

      7KB

    • MD5

      92ec0ad5172f3a97d6656b70c111af98

    • SHA1

      e15fc1668ccdaf70e5831906191f611136b7ac65

    • SHA256

      5e31f3d2ad06413f4c3824c6bbe56cf7dffda38cec5bd1b2c0c377718a11297c

    • SHA512

      f895ac70eb9c68b9361b32d71c3135f3ccd2f7b676d03061677416b883a1be7a8bad85df8de8202f612ebdfa8564ce77d34f7d5eb9a818fac0098cb4ca856762

    • Phorphiex Payload

    • Phorphiex Worm

      Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

    • Windows security bypass

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

3
T1112

Tasks