General

  • Target

    aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef

  • Size

    664KB

  • Sample

    220724-rvgcrsfgdm

  • MD5

    acf73cf8ddfb182b8559779f8a165e49

  • SHA1

    d944a1bc327f26b8c17345d04986ef0437d85484

  • SHA256

    aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef

  • SHA512

    284a26b9165b58c9a531364bb7609abdc38868efd38878b0cdf78bed45ef0ee73a83719ec972ee86416dddc0e9ab698ed387537e12c9aed75d81ad817a3c8fd0

Malware Config

Targets

    • Target

      aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef

    • Size

      664KB

    • MD5

      acf73cf8ddfb182b8559779f8a165e49

    • SHA1

      d944a1bc327f26b8c17345d04986ef0437d85484

    • SHA256

      aa193db9460c9e0fd373d2fb1f84b1c4485f559ae97db128a267d530c24efdef

    • SHA512

      284a26b9165b58c9a531364bb7609abdc38868efd38878b0cdf78bed45ef0ee73a83719ec972ee86416dddc0e9ab698ed387537e12c9aed75d81ad817a3c8fd0

    • Phobos

      Phobos ransomware appeared at the beginning of 2019.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Modifies Windows Firewall

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks