General

  • Target

    0d047b7e3d8841a58253b9f32eb62c6c6aa735905839233edcd277ffb5246340

  • Size

    10KB

  • Sample

    241027-mmgw4svlat

  • MD5

    72625fba0f89548239c54f0bcd844728

  • SHA1

    d66ddeb0c770d1545637f7ddaad7afcd60182fbe

  • SHA256

    0d047b7e3d8841a58253b9f32eb62c6c6aa735905839233edcd277ffb5246340

  • SHA512

    a9d0052d51857730a05406edcf46e5179de2ebe42923f22a8d976809d0c66b89f319b81982a7aafa56d10abf912e654a5a3553061ffec385e04998a1782959d7

  • SSDEEP

    96:FyYucXlgwXzv3L+Ud9BDoiR+YyM4TtspKW0ffl2tsB1JxGEhBV2qh9C7tCEW8q+:FzuWgs7+MR+2itojtWJxThBVthuWV+

Malware Config

Extracted

Family

phorphiex

C2

http://185.215.113.84

Targets

    • Target

      0d047b7e3d8841a58253b9f32eb62c6c6aa735905839233edcd277ffb5246340

    • Size

      10KB

    • MD5

      72625fba0f89548239c54f0bcd844728

    • SHA1

      d66ddeb0c770d1545637f7ddaad7afcd60182fbe

    • SHA256

      0d047b7e3d8841a58253b9f32eb62c6c6aa735905839233edcd277ffb5246340

    • SHA512

      a9d0052d51857730a05406edcf46e5179de2ebe42923f22a8d976809d0c66b89f319b81982a7aafa56d10abf912e654a5a3553061ffec385e04998a1782959d7

    • SSDEEP

      96:FyYucXlgwXzv3L+Ud9BDoiR+YyM4TtspKW0ffl2tsB1JxGEhBV2qh9C7tCEW8q+:FzuWgs7+MR+2itojtWJxThBVthuWV+

    • Modifies security service

    • Phorphiex family

    • Phorphiex payload

    • Phorphiex, Phorpiex

      Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Windows security bypass

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks