General

  • Target

    953425bbd6408fb6ee0b3c9f33d4b1928e1059f0f23eebf7ad57444114816a6dN

  • Size

    177KB

  • Sample

    241029-kp5pvatdrp

  • MD5

    cf3539efa51b18889e96f7ede3ac2b10

  • SHA1

    dcd9a39a25cac8c0e7a458f8a8581cf8a7673e1c

  • SHA256

    953425bbd6408fb6ee0b3c9f33d4b1928e1059f0f23eebf7ad57444114816a6d

  • SHA512

    3f11087bd431df59840d7d543a7f8534eec51d3982cc3522b3aecf7bb7da13b13ec2a9444c44ff6df8f72618d1c925cdd94734f75859bb1e3044b122ffe888a9

  • SSDEEP

    3072:49qoOaag5aCd+n3KrzhqWZPNlA/NN4DsLUs7cOtzP1yN:4wpaag5xE3K/tlq4DtsoOZtyN

Malware Config

Extracted

Family

phorphiex

C2

http://185.215.113.66/

http://91.202.233.141/

Wallets

0xCa90599132C4D88907Bd8E046540284aa468a035

TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6

qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r

XryzFMFVpDUvU7famUGf214EXD3xNUSmQf

rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9

AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z

LTK4xdKPAgFHPLan8kriAD7eY4heyy73mB

MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q

4BB7ckkaPTyADc8trtuwDoZxywaR4eNL5cDJ3KBjq9GraN4mUFztf7mLS7WgT7Bh7uPqpjvA4ypVwXKCJ1vvLWWAFvSmDoD

15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC

1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK

ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp

3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc

3PC3JJEUP8CCAH8ZSTzTpTwMLNrBFe9EvM

DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA

t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh

stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj

bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2

bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr

bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      953425bbd6408fb6ee0b3c9f33d4b1928e1059f0f23eebf7ad57444114816a6dN

    • Size

      177KB

    • MD5

      cf3539efa51b18889e96f7ede3ac2b10

    • SHA1

      dcd9a39a25cac8c0e7a458f8a8581cf8a7673e1c

    • SHA256

      953425bbd6408fb6ee0b3c9f33d4b1928e1059f0f23eebf7ad57444114816a6d

    • SHA512

      3f11087bd431df59840d7d543a7f8534eec51d3982cc3522b3aecf7bb7da13b13ec2a9444c44ff6df8f72618d1c925cdd94734f75859bb1e3044b122ffe888a9

    • SSDEEP

      3072:49qoOaag5aCd+n3KrzhqWZPNlA/NN4DsLUs7cOtzP1yN:4wpaag5xE3K/tlq4DtsoOZtyN

    • Modifies firewall policy service

    • Modifies security service

    • Phorphiex family

    • Phorphiex payload

    • Phorphiex, Phorpiex

      Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Stops running service(s)

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks