General

  • Target

    2025-04-02_7dd761a2fea74805209b966801f3e82b_phobos

  • Size

    50KB

  • Sample

    250402-1jyx4swqx9

  • MD5

    7dd761a2fea74805209b966801f3e82b

  • SHA1

    503e6a8229dc2972f2e8295a9c28697b7b2d278e

  • SHA256

    1121a2f56957d76f509355efffc171c0e8e282caf9c8d6e71482ee4671dd7502

  • SHA512

    02ce98ae5d73570e76bfbb1c6cd084737dbb660d47c546df064e99403038f934561fcf80c95d66a5ab008a3353e9fa90be04cefbd067c00d2c357859c77bca5d

  • SSDEEP

    1536:sRvoU+XfE9ICf4t1OwruWiyy0uUeARxPiZHX:s6X89NfsjruWiy2ARy

Malware Config

Targets

    • Target

      2025-04-02_7dd761a2fea74805209b966801f3e82b_phobos

    • Size

      50KB

    • MD5

      7dd761a2fea74805209b966801f3e82b

    • SHA1

      503e6a8229dc2972f2e8295a9c28697b7b2d278e

    • SHA256

      1121a2f56957d76f509355efffc171c0e8e282caf9c8d6e71482ee4671dd7502

    • SHA512

      02ce98ae5d73570e76bfbb1c6cd084737dbb660d47c546df064e99403038f934561fcf80c95d66a5ab008a3353e9fa90be04cefbd067c00d2c357859c77bca5d

    • SSDEEP

      1536:sRvoU+XfE9ICf4t1OwruWiyy0uUeARxPiZHX:s6X89NfsjruWiy2ARy

    • Phobos

      Phobos ransomware appeared at the beginning of 2019.

    • Phobos family

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Renames multiple (781) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Modifies Windows Firewall

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks