General

  • Target

    sphinx_1.0.2.0.vir

  • Size

    1.5MB

  • Sample

    200719-qgt4bvy3n6

  • MD5

    03daacbdcdd8b7a202fd3d4c56ca3bf4

  • SHA1

    8625c393222f587074feee1af1c6e4807faea43f

  • SHA256

    c0dfbb822dea47692a8ed0d266c518495f1a3efd3a4208fb5251bcdf08f18d42

  • SHA512

    775dcd98efc7d5f955734e65cd156b61f4740740746669305a4c9712d197564e016f77da5d6c5fab244e78eb9efb2df58266fcaf61e89c5e3ad6a3e2e4a4acaa

Score
8/10

Malware Config

Targets

    • Target

      sphinx_1.0.2.0.vir

    • Size

      1.5MB

    • MD5

      03daacbdcdd8b7a202fd3d4c56ca3bf4

    • SHA1

      8625c393222f587074feee1af1c6e4807faea43f

    • SHA256

      c0dfbb822dea47692a8ed0d266c518495f1a3efd3a4208fb5251bcdf08f18d42

    • SHA512

      775dcd98efc7d5f955734e65cd156b61f4740740746669305a4c9712d197564e016f77da5d6c5fab244e78eb9efb2df58266fcaf61e89c5e3ad6a3e2e4a4acaa

    Score
    8/10
    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Tasks