General

  • Target

    4b355796a710bec51e37958a39ca0fb28f462f80b15b3e42162bf47cdf0fca79

  • Size

    72KB

  • Sample

    220130-21panscea9

  • MD5

    e3fb1eb78c7e953d76de0b973e069d16

  • SHA1

    613b6a678c28ae0291865739c7deeea4923b52c5

  • SHA256

    4b355796a710bec51e37958a39ca0fb28f462f80b15b3e42162bf47cdf0fca79

  • SHA512

    bb63a7f2b772c9c6d93f9f2ca0918a96a36111df4cd9cce96854fa58d4a4bf6f76efa0054069f77c423914fe3fa94f29c2f4b6a0a01de612d3f4a3034fc42327

Malware Config

Targets

    • Target

      4b355796a710bec51e37958a39ca0fb28f462f80b15b3e42162bf47cdf0fca79

    • Size

      72KB

    • MD5

      e3fb1eb78c7e953d76de0b973e069d16

    • SHA1

      613b6a678c28ae0291865739c7deeea4923b52c5

    • SHA256

      4b355796a710bec51e37958a39ca0fb28f462f80b15b3e42162bf47cdf0fca79

    • SHA512

      bb63a7f2b772c9c6d93f9f2ca0918a96a36111df4cd9cce96854fa58d4a4bf6f76efa0054069f77c423914fe3fa94f29c2f4b6a0a01de612d3f4a3034fc42327

    • Phorphiex Payload

    • Phorphiex Worm

      Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

    • Windows security bypass

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

3
T1112

Tasks