Resubmissions

12-11-2021 18:04

211112-wnsjnsdhh4 10

01-10-2021 16:29

211001-tza3nacdfk 10

General

  • Target

    f878382efbdcff1151e93bc9ca4c016e72a0c424137728995ad722a36ce37241

  • Size

    75KB

  • Sample

    211001-tza3nacdfk

  • MD5

    4ece4d073b759e00584078490e1424f8

  • SHA1

    a4ec941cfcc1e8151da0bbb5aabe8e5a8d88f6dc

  • SHA256

    f878382efbdcff1151e93bc9ca4c016e72a0c424137728995ad722a36ce37241

  • SHA512

    0c79c74c8f7111a9d6904cfa03b64925ab8b64efe6121eac8836371558672017753af22f7cbb9f2ce3e63642dc2c4b039a6860e33e130fa693596b77896f4654

Malware Config

Targets

    • Target

      f878382efbdcff1151e93bc9ca4c016e72a0c424137728995ad722a36ce37241

    • Size

      75KB

    • MD5

      4ece4d073b759e00584078490e1424f8

    • SHA1

      a4ec941cfcc1e8151da0bbb5aabe8e5a8d88f6dc

    • SHA256

      f878382efbdcff1151e93bc9ca4c016e72a0c424137728995ad722a36ce37241

    • SHA512

      0c79c74c8f7111a9d6904cfa03b64925ab8b64efe6121eac8836371558672017753af22f7cbb9f2ce3e63642dc2c4b039a6860e33e130fa693596b77896f4654

    • Phorphiex Payload

    • Phorphiex Worm

      Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

    • Windows security bypass

    • suricata: ET MALWARE APT-C-23 Activity (GET)

      suricata: ET MALWARE APT-C-23 Activity (GET)

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

3
T1112

Tasks