MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2a50a42d3c44e6e3890a53228cb84f6fdb17e38b31422c68b8634a06d36cc324. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Phobos


Vendor detections: 13


Intelligence 13 IOCs YARA 4 File information Comments 1

SHA256 hash: 2a50a42d3c44e6e3890a53228cb84f6fdb17e38b31422c68b8634a06d36cc324
SHA3-384 hash: 6cda8502396ec2e6ca89c48fadb8968cc67ef43486d0d309a615fc7d3133cf9050d46827ef19b818988f02e6fcf4f582
SHA1 hash: a0f2cc3a7fcb60f7389ee4555dbddc2ad5822c7e
MD5 hash: 7e8b8c909f96c4058a7e8f7acd171a78
humanhash: missouri-undress-moon-south
File name:7e8b8c909f96c4058a7e8f7acd171a78
Download: download sample
Signature Phobos
File size:391'168 bytes
First seen:2023-09-12 06:53:33 UTC
Last seen:2023-09-12 07:37:14 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 6144:MemFwi7Aaj8cDtp5adXbu7FK6jT92wiGgYP91k0dMENe2RurYEhM9+:Mnwi7RDtja5qN2PRYk0d/VRl
TLSH T14084F16133489E0EC65FADB5E0E12410C771D06B3152EB5F218452AC66F77D7CA8E3EA
TrID 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.0% (.EXE) Win64 Executable (generic) (10523/12/4)
6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win32 Executable (generic) (4505/5/1)
1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Reporter zbetcheckin
Tags:32 exe Phobos

Intelligence


File Origin
# of uploads :
2
# of downloads :
329
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
7e8b8c909f96c4058a7e8f7acd171a78
Verdict:
Malicious activity
Analysis date:
2023-09-12 06:56:21 UTC
Tags:
ransomware

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Сreating synchronization primitives
Launching a service
Launching cmd.exe command interpreter
Creating a process with a hidden window
Searching for synchronization primitives
Changing a file
Modifying an executable file
Sending a custom TCP request
Modifies multiple files
Replacing executable files
Launching the process to change the firewall settings
Creating a file in the Program Files directory
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Creating a file in the %AppData% subdirectories
Moving a file to the %AppData% subdirectory
Launching a process
Creating a window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Creating a file in the mass storage device
Deleting volume shadow copies
Enabling autorun for a service
Preventing system recovery
Enabling autorun by creating a file
Infecting executable files
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Phobos Ransomware
Verdict:
Malicious
Threat name:
ByteCode-MSIL.Ransomware.Phobos
Status:
Malicious
First seen:
2023-09-12 06:54:07 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
18 of 22 (81.82%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:phobos evasion persistence ransomware spyware stealer
Behaviour
Checks SCSI registry key(s)
Interacts with shadow copies
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy service COM API
Enumerates physical storage devices
Drops file in Program Files directory
Suspicious use of SetThreadContext
Adds Run key to start application
Drops desktop.ini file(s)
Checks computer location settings
Drops startup file
Reads user/profile data of web browsers
Deletes backup catalog
Modifies Windows Firewall
Deletes shadow copies
Modifies boot configuration data using bcdedit
Renames multiple (312) files with added filename extension
Renames multiple (470) files with added filename extension
Phobos
Unpacked files
SH256 hash:
b4b89828380c4781c7beafa6dce00ae38cd4adc13ad56792996e28c41def5c53
MD5 hash:
966061cecee2b65fe7149dfa1d0f2c3a
SHA1 hash:
691ed7b6c4c0bdd824ede0514aacda9d7adc51f1
SH256 hash:
0a7e2f7d6181554ffc2789eaa77228a55fad133c944805d422eb2b9a9e76f636
MD5 hash:
2117e3077a7f9cf5e2595e2fc1fba8f4
SHA1 hash:
65a4789b96001ce6a5a3d62724d72fc4005eaff6
SH256 hash:
6dd246c17d2e179cff99625e17b44edff7e12c3d55d80acad3e058b4612e83a1
MD5 hash:
f4a95a928000345be96fccf44fecc505
SHA1 hash:
4f3864a3cab317f4866ba320725961544f308cbd
SH256 hash:
19efdf03cb94895935225795f68bb9abfded1869687367013b8b4eee3cc99372
MD5 hash:
4e29f75c0c51b9dec76955f0382d9541
SHA1 hash:
4899aa8e3f57339cbaec8faab777897a76fe1c3a
SH256 hash:
2a50a42d3c44e6e3890a53228cb84f6fdb17e38b31422c68b8634a06d36cc324
MD5 hash:
7e8b8c909f96c4058a7e8f7acd171a78
SHA1 hash:
a0f2cc3a7fcb60f7389ee4555dbddc2ad5822c7e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Phobos

Executable exe 2a50a42d3c44e6e3890a53228cb84f6fdb17e38b31422c68b8634a06d36cc324

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-09-12 06:53:34 UTC

url : hxxp://mksad917.xyz/777/mtxnQxa.exe