General

  • Target

    eee23a8f3e0b0cb2929057cb468f17297c7b46b1fc5c357e17b56ee6a605121b

  • Size

    590KB

  • Sample

    220201-c8kvsafecq

  • MD5

    61422ea7d3db9045112231b4897d4483

  • SHA1

    89e0adc43be18140f65add9bafcb3eb0440ea597

  • SHA256

    eee23a8f3e0b0cb2929057cb468f17297c7b46b1fc5c357e17b56ee6a605121b

  • SHA512

    dc689824c88aae3d48316e0799b49c7971d6064e96918a1e4cbcf6973cff9333568022f12d295df67f3bca4326bf547a4ec2ba8af68f102ef9db1e2f0694577f

Malware Config

Targets

    • Target

      eee23a8f3e0b0cb2929057cb468f17297c7b46b1fc5c357e17b56ee6a605121b

    • Size

      590KB

    • MD5

      61422ea7d3db9045112231b4897d4483

    • SHA1

      89e0adc43be18140f65add9bafcb3eb0440ea597

    • SHA256

      eee23a8f3e0b0cb2929057cb468f17297c7b46b1fc5c357e17b56ee6a605121b

    • SHA512

      dc689824c88aae3d48316e0799b49c7971d6064e96918a1e4cbcf6973cff9333568022f12d295df67f3bca4326bf547a4ec2ba8af68f102ef9db1e2f0694577f

    • Modifies Windows Defender Real-time Protection settings

    • Phorphiex Payload

    • Phorphiex Worm

      Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

    • Windows security bypass

    • suricata: ET MALWARE APT-C-23 Activity (GET)

      suricata: ET MALWARE APT-C-23 Activity (GET)

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • Executes dropped EXE

    • Sets service image path in registry

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

5
T1112

Disabling Security Tools

3
T1089

Tasks