General
-
Target
0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73
-
Size
104KB
-
Sample
240418-ngrd2acg5v
-
MD5
e28889b5f98d8ed1a00835e1ca8a3b21
-
SHA1
b665e89468ac7ae566aa996aeec203b25bf24b0c
-
SHA256
0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73
-
SHA512
d3f1708274dd84045c46c3315aeba5c16f890d94ddfcda0df29e96bc3a0159ead0f8945898d6dde25ad01981e385a41b69b1bdfd700e08f47249bffece941cbd
-
SSDEEP
3072:Xl58BV2ZjooGTb5PjMdhS3KV3/jjKwcNHjo86r8X7FS8EFc:158BIFveZjMrS3q3/jjKwcNHjo86r8r6
Behavioral task
behavioral1
Sample
0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
phorphiex
http://185.215.113.66/
0xAa3ea4838e8E3F6a1922c6B67E3cD6efD1ff175b
THRUoPK7oYqF7YyKZJvPYwTH35JsPZVPto
1Hw9tx4KyTq4oRoLVhPb4hjDJcLhEa4Tn6
qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut
XtxFdsKkRN3oVDXtN2ipcHeNi87basT2sL
LXMNcn9D8FQKzGNLjdSyR9dEM8Rsh9NzyX
rwn7tb5KQjXEjH42GgdHWHec5PPhVgqhSH
ARML6g7zynrwUHJbFJCCzMPiysUFXYBGgQ
48jYpFT6bT8MTeph7VsyzCQeDsGHqdQNc2kUkRFJPzfRHHjarBvBtudPUtParMkDzZbYBrd3yntWBQcsnVBNeeMbN9EXifg
3PL7YCa4akNYzuScqQwiSbtTP9q9E9PLreC
3FerB8kUraAVGCVCNkgv57zTBjUGjAUkU3
D9AJWrbYsidS9rAU146ifLRu1fzX9oQYSH
t1gvVWHnjbGTsoWXEyoTFojc2GqEzBgvbEn
bnb1cgttf7t5hu7ud3c436ufhcmy59qnkd09adqczd
bc1q0fusmmgycnhsd5cadsuz2hk8d4maausjfjypqg
bitcoincash:qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut
GAUCC7ZBSU2KJMHXOZD6AP5LOBGKNDPCDNRYP2CO2ACR63YCSUBNT5QE
Targets
-
-
Target
0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73
-
Size
104KB
-
MD5
e28889b5f98d8ed1a00835e1ca8a3b21
-
SHA1
b665e89468ac7ae566aa996aeec203b25bf24b0c
-
SHA256
0429bed4098d95e68e4686ed79cb3967e7396956a095433dd56f4e3d49135d73
-
SHA512
d3f1708274dd84045c46c3315aeba5c16f890d94ddfcda0df29e96bc3a0159ead0f8945898d6dde25ad01981e385a41b69b1bdfd700e08f47249bffece941cbd
-
SSDEEP
3072:Xl58BV2ZjooGTb5PjMdhS3KV3/jjKwcNHjo86r8X7FS8EFc:158BIFveZjMrS3q3/jjKwcNHjo86r8r6
-
Modifies security service
-
Phorphiex payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1