General

  • Target

    sysvokf.exe

  • Size

    30KB

  • Sample

    241104-q4e1ma1dkq

  • MD5

    e830c810bbd14744ce9957f32b3a6fde

  • SHA1

    91a6fc52ecf8eae4d9d2b5d53a91efbaaad88da7

  • SHA256

    ff439c4df17f9cf699f9687225447b526713f0046c7c78412dba5b8bfd37d741

  • SHA512

    c0ad4b7d713c4c5547c5cbd74304378c4f98001a2eebb0a0223f0766db81e3a8638496497052ce8acbfd3182d6760f5b32e9497c6cb3307e41567454517e00fd

  • SSDEEP

    384:PtkpcwLsYEaysekAM1PsLwApaKZ5IRvKztY2Gci0WhYzJjn2Cb1Bg3cW53Yllyt3:PAAxPuPsLwA9ZuYztzYhY0oBEcWGl

Malware Config

Extracted

Family

phorphiex

C2

http://b0t.to/

http://gshrghirhgsgrao.to/

http://hehfaofiehgggao.to/

http://soghrrsoeuhugao.to/

http://eiiiaoihoaeruao.to/

http://roiriorisioroao.to/

http://ouhgousgoahutao.to/

http://oeoaoueuoeuoaao.to/

http://aiaizzzezeezeao.to/

http://ouauooaoaoeeuao.to/

http://oeeoeuueueuueao.to/

http://eobbeaubfeuueao.to/

http://aauaaaeieiieeao.to/

http://aaaeieiiiofffao.to/

http://infineinfinigao.to/

http://baoefubfbfigoao.to/

http://aaauuwiifoogeao.to/

http://plporsiszsgetao.to/

http://gshrghirhgsgrla.co/

http://hehfaofiehgggla.co/

Wallets

1L6sJ7pmk6EGMUoTmpdbLez9dXACcirRHh

qzgdgnfd805z83wpu04rhld0yqs4dlrd35ll0ltqql

Xt8ZtCcG9BFoc7NfUNBVnxcTvYT4mmzh5i

D7otx94yAiXMUuuff23v8PAYH5XpkdQ89M

0xa5228127395263575a4b4f532e4f132b14599d24

LUMrZN6GTetcrXtzMmRayLpRN9JrCNcTe7

t1PVHo3JR9ZAxMxRXgTziGBeDwfb5Gwm64z

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:67.0) Gecko/20100101 Firefox/67.0

Extracted

Family

phorphiex

C2

http://185.215.113.84

http://185.215.113.66

Targets

    • Target

      sysvokf.exe

    • Size

      30KB

    • MD5

      e830c810bbd14744ce9957f32b3a6fde

    • SHA1

      91a6fc52ecf8eae4d9d2b5d53a91efbaaad88da7

    • SHA256

      ff439c4df17f9cf699f9687225447b526713f0046c7c78412dba5b8bfd37d741

    • SHA512

      c0ad4b7d713c4c5547c5cbd74304378c4f98001a2eebb0a0223f0766db81e3a8638496497052ce8acbfd3182d6760f5b32e9497c6cb3307e41567454517e00fd

    • SSDEEP

      384:PtkpcwLsYEaysekAM1PsLwApaKZ5IRvKztY2Gci0WhYzJjn2Cb1Bg3cW53Yllyt3:PAAxPuPsLwA9ZuYztzYhY0oBEcWGl

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Phorphiex family

    • Phorphiex payload

    • Phorphiex, Phorpiex

      Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Windows security bypass

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks