MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 22f524abc98f958705febd3761bedc85ec1ae859316a653b67c0c01327533092. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Phorpiex


Vendor detections: 13


Intelligence 13 IOCs YARA 1 File information Comments

SHA256 hash: 22f524abc98f958705febd3761bedc85ec1ae859316a653b67c0c01327533092
SHA3-384 hash: 688eeceffb99631e3eb6c2abf5ae5dc5b271f9847f9234b272a98d741a4aea88ce6732aa9fdba97cabf7bd17fbc78761
SHA1 hash: 6ffcc083956c5ac19826bdd87e12f87817ee837c
MD5 hash: ed2d7b25bb360cccb4f0f6a4f8732d7a
humanhash: aspen-winter-fanta-ohio
File name:ed2d7b25bb360cccb4f0f6a4f8732d7a.exe
Download: download sample
Signature Phorpiex
File size:77'312 bytes
First seen:2022-08-15 16:07:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2f2316fb946682a102e453a8ae405904 (5 x Phorpiex)
ssdeep 1536:K3Mz8enofIxQrFP+ZrFugrZpVnWw7V15Frrmi:xweZQhGZ5ugDVnj7V15Fr
TLSH T1CB732810F6D0C03AF0F740FBE2FB05AA592CEFB4530698E752D9A85F5B215D1A9364A3
TrID 38.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
20.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
13.0% (.EXE) Win64 Executable (generic) (10523/12/4)
8.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter abuse_ch
Tags:exe Phorpiex

Intelligence


File Origin
# of uploads :
1
# of downloads :
302
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ed2d7b25bb360cccb4f0f6a4f8732d7a.exe
Verdict:
Malicious activity
Analysis date:
2022-08-15 16:17:47 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a file in the Windows directory
Enabling the 'hidden' option for recently created files
Creating a process from a recently created file
Searching for many windows
Creating a window
Creating a file in the %temp% directory
Sending a custom TCP request
DNS request
Sending a UDP request
Creating a file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Blocking the Windows Security Center notifications
Creating a file in the mass storage device
Enabling threat expansion on mass storage devices
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CallSleep
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
greyware shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Phorpiex
Detection:
malicious
Classification:
troj.evad.mine
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to check if Internet connection is working
Contains functionality to detect sleep reduction / modifications
Creates HTML files with .exe extension (expired dropper behavior)
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after checking mutex)
Found strings related to Crypto-Mining
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Phorpiex
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 684211 Sample: Id4zlrsrZ4.exe Startdate: 15/08/2022 Architecture: WINDOWS Score: 100 31 Multi AV Scanner detection for domain / URL 2->31 33 Antivirus detection for URL or domain 2->33 35 Antivirus / Scanner detection for submitted sample 2->35 37 4 other signatures 2->37 6 Id4zlrsrZ4.exe 1 1 2->6         started        10 winrecsv.exe 8 16 2->10         started        process3 dnsIp4 19 C:\Windows\winrecsv.exe, PE32 6->19 dropped 39 Found evasive API chain (may stop execution after checking mutex) 6->39 41 Contains functionality to check if Internet connection is working 6->41 43 Drops executables to the windows directory (C:\Windows) and starts them 6->43 45 Contains functionality to detect sleep reduction / modifications 6->45 13 winrecsv.exe 6->13         started        25 185.215.113.66, 49762, 49763, 49778 WHOLESALECONNECTIONSNL Portugal 10->25 27 176.194.22.84, 40500 TI-ASMoscowRussiaRU Russian Federation 10->27 29 4 other IPs or domains 10->29 21 C:\Users\user\AppData\Local\...\509517324.exe, PE32 10->21 dropped 47 Changes security center settings (notifications, updates, antivirus, firewall) 10->47 49 Hides that the sample has been downloaded from the Internet (zone.identifier) 10->49 16 509517324.exe 14 10->16         started        file5 signatures6 process7 dnsIp8 51 Antivirus detection for dropped file 13->51 53 Multi AV Scanner detection for dropped file 13->53 55 Found evasive API chain (may stop execution after checking mutex) 13->55 63 2 other signatures 13->63 23 185.215.113.84, 49765, 49767, 80 WHOLESALECONNECTIONSNL Portugal 16->23 57 Creates HTML files with .exe extension (expired dropper behavior) 16->57 59 Machine Learning detection for dropped file 16->59 61 Hides that the sample has been downloaded from the Internet (zone.identifier) 16->61 signatures9
Threat name:
Win32.Trojan.FWDisable
Status:
Malicious
First seen:
2022-08-15 16:08:08 UTC
File Type:
PE (Exe)
AV detection:
25 of 26 (96.15%)
Threat level:
  5/5
Result
Malware family:
phorphiex
Score:
  10/10
Tags:
family:phorphiex evasion loader persistence trojan worm
Behaviour
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Adds Run key to start application
Loads dropped DLL
Windows security modification
Executes dropped EXE
Phorphiex
Windows security bypass
Malware Config
C2 Extraction:
http://185.215.113.66/twizt/
Unpacked files
SH256 hash:
22f524abc98f958705febd3761bedc85ec1ae859316a653b67c0c01327533092
MD5 hash:
ed2d7b25bb360cccb4f0f6a4f8732d7a
SHA1 hash:
6ffcc083956c5ac19826bdd87e12f87817ee837c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Phorpiex

Executable exe 22f524abc98f958705febd3761bedc85ec1ae859316a653b67c0c01327533092

(this sample)

Comments