General

  • Target

    phobos.zip

  • Size

    60KB

  • Sample

    231011-xedjtsge77

  • MD5

    1f66ca1421d3b964f6c8e7f911ad61a3

  • SHA1

    18a153429ebd57074b868dbc32f9e7c45c1e05ac

  • SHA256

    e340e527d87d4164f4147e6229c3034d09b25ceb4fed28b9dceeb6a18a60d7fc

  • SHA512

    030d0a09bdecc565ce08ed25daf6bf2f296fb6d1f6681d9c3b1ab9de096b1c93a250760417733e9691ac3da735a8252d8dcb4143c017eb2a4502f372be0a1158

  • SSDEEP

    1536:+CEaKXtuQwcK5dRhOuLcxcCP1j0CpvdMvrxPzXQq:izuQw/5H1YNPV61DQq

Malware Config

Targets

    • Target

      phobos.exe

    • Size

      96KB

    • MD5

      053cbe71a53d9aa4ccf8962f108c1453

    • SHA1

      67930f9a901468eb24b09c1a48251d21e3057f10

    • SHA256

      3bcbafeeb899229e6b8821abc2c146754f4380442fcd4a7fb194be43d642a701

    • SHA512

      0bee441f51672b7715775d248bbd991f52cf346e91d90b0050f3920fa29c3f98a82721647e7544f909d8c4789c8024e76d1adcc4ef2706a2337f3b9860ec9603

    • SSDEEP

      1536:JxqjQ+P04wsmJCBhsrD5utwNeRBl5PT/rx1mzwRMSTdLpJGM:sr85CI5u2QRrmzwR5JT

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Phobos

      Phobos ransomware appeared at the beginning of 2019.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Renames multiple (53) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Renames multiple (78) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks