General

  • Target

    ABC6E87B5F26BADF.zip

  • Size

    14KB

  • Sample

    241104-kxt83s1jfl

  • MD5

    6a0bc4c826b94696519cbbb1a272932c

  • SHA1

    f6586e6cd250fa0847b9d886110b230f5edf3523

  • SHA256

    e0fa830fae317de959f388ef4c8ae19c38bb7ddbd9ab95ed76d56a1838e8b5c2

  • SHA512

    056052bd6df060129f32905ddbe2855390bda31a198b36eb99137347eb6b8fbb6cc9a48bb0ee478f19287cc19d7971c1381ba851622763ab0e2e86cf4d45ca83

  • SSDEEP

    384:cf8937sWkygPO0/TJgTroyqHGr8dQWnEhwYgv:cf8JYGEgHot2gtEhwYgv

Malware Config

Extracted

Family

phorphiex

C2

http://b0t.to/

http://gshrghirhgsgrao.to/

http://hehfaofiehgggao.to/

http://soghrrsoeuhugao.to/

http://eiiiaoihoaeruao.to/

http://roiriorisioroao.to/

http://ouhgousgoahutao.to/

http://oeoaoueuoeuoaao.to/

http://aiaizzzezeezeao.to/

http://ouauooaoaoeeuao.to/

http://oeeoeuueueuueao.to/

http://eobbeaubfeuueao.to/

http://aauaaaeieiieeao.to/

http://aaaeieiiiofffao.to/

http://infineinfinigao.to/

http://baoefubfbfigoao.to/

http://aaauuwiifoogeao.to/

http://plporsiszsgetao.to/

http://gshrghirhgsgrla.co/

http://hehfaofiehgggla.co/

Wallets

1L6sJ7pmk6EGMUoTmpdbLez9dXACcirRHh

qzgdgnfd805z83wpu04rhld0yqs4dlrd35ll0ltqql

Xt8ZtCcG9BFoc7NfUNBVnxcTvYT4mmzh5i

D7otx94yAiXMUuuff23v8PAYH5XpkdQ89M

0xa5228127395263575a4b4f532e4f132b14599d24

LUMrZN6GTetcrXtzMmRayLpRN9JrCNcTe7

t1PVHo3JR9ZAxMxRXgTziGBeDwfb5Gwm64z

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:67.0) Gecko/20100101 Firefox/67.0

Extracted

Family

phorphiex

C2

http://185.215.113.84

http://185.215.113.66

Targets

    • Target

      980f4f8d01c746653b3a9b7fc41be0a66d88ac7c8d7f729eb8e123f3604f38c1

    • Size

      30KB

    • MD5

      6a702ef477c5006b5a8f98ac6d10d4b2

    • SHA1

      1698df30c71382a2d14b56d5047ce4ef8db4eb54

    • SHA256

      980f4f8d01c746653b3a9b7fc41be0a66d88ac7c8d7f729eb8e123f3604f38c1

    • SHA512

      3ff2bbcdf8b6eac5e6e513973309e096be857f90542ee1c79c50ef789fd207fc65c99f5daacd91f63745f05ad496ea483ada981427991563ef3364ccb4becf2c

    • SSDEEP

      384:PtkpcwLsYEaysekAM1PsLwApaKZ5IRvKztY2Gci0WhYzJjn2Cb1Bg3cW53Yllyt3:PAAxPuPsLwA9ZuYztzYhY0oBEcWGl

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Phorphiex family

    • Phorphiex payload

    • Phorphiex, Phorpiex

      Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Windows security bypass

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks