MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5c8d519b601447d102fc9b2f83b894bf15939506a3ad8aa53fa535de36121ce7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Phorpiex


Vendor detections: 15


Intelligence 15 IOCs YARA File information Comments

SHA256 hash: 5c8d519b601447d102fc9b2f83b894bf15939506a3ad8aa53fa535de36121ce7
SHA3-384 hash: 208b874d559188b2a3d3ed5175e42a8b9048642575c8283a2b106dbe87eb9453b4e9848f74db57e343b6138bca54888b
SHA1 hash: 7433000eeb78f9ae908e11eb67e9391622e7e5b8
MD5 hash: 459c987558d3380fca8c840549f83111
humanhash: wolfram-harry-don-pennsylvania
File name:459c987558d3380fca8c840549f83111.exe
Download: download sample
Signature Phorpiex
File size:6'656 bytes
First seen:2023-01-22 17:27:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 080d27a34deaeb58ce07978248e9f5dc (4 x Phorpiex, 1 x CoinMiner)
ssdeep 96:esd1t761bndKil7aBcxu0PtboynuYUBtCt:Jt7Yb975u0P1oynfUBM
Threatray 1'432 similar samples on MalwareBazaar
TLSH T19DD1B506BB040690E1DC4AF01576A24F9AFD4A72031545FFE3B3254A6CB53B6B427B7B
TrID 40.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
16.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
12.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
11.0% (.EXE) Win32 Executable (generic) (4505/5/1)
5.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter abuse_ch
Tags:exe Phorpiex

Intelligence


File Origin
# of uploads :
1
# of downloads :
212
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
phorpiex
ID:
1
File name:
459c987558d3380fca8c840549f83111.exe
Verdict:
Malicious activity
Analysis date:
2023-01-22 17:35:40 UTC
Tags:
loader trojan phorpiex

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Сreating synchronization primitives
Creating a file in the Windows directory
Enabling the 'hidden' option for recently created files
Creating a window
DNS request
Sending a UDP request
Sending a custom TCP request
Creating a file
Changing an executable file
Query of malicious DNS domain
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Blocking the Windows Security Center notifications
Creating a file in the mass storage device
Sending an HTTP GET request to an infection source
Enabling threat expansion on mass storage devices
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
CallSleep
EvasionGetTickCount
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
clipbanker greyware phorpiex shell32.dll tiny
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Phorpiex, RHADAMANTHYS, Xmrig
Detection:
malicious
Classification:
troj.evad.mine
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to check if Internet connection is working
Contains functionality to detect sleep reduction / modifications
Detected Stratum mining protocol
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after checking mutex)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected Phorpiex
Yara detected RHADAMANTHYS Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 789298 Sample: lpcKUPgRBb.exe Startdate: 22/01/2023 Architecture: WINDOWS Score: 100 104 Snort IDS alert for network traffic 2->104 106 Antivirus detection for URL or domain 2->106 108 Antivirus detection for dropped file 2->108 110 12 other signatures 2->110 9 lpcKUPgRBb.exe 16 2->9         started        14 winsvrupd.exe 2->14         started        16 powershell.exe 35 2->16         started        18 3 other processes 2->18 process3 dnsIp4 96 twizt.org 185.215.113.84, 49695, 49696, 49706 WHOLESALECONNECTIONSNL Portugal 9->96 82 C:\Users\user\AppData\Local\...\34486596.exe, PE32 9->82 dropped 84 C:\Users\user\AppData\Local\...\tpp[1].exe, PE32 9->84 dropped 144 Hides that the sample has been downloaded from the Internet (zone.identifier) 9->144 20 34486596.exe 1 1 9->20         started        86 C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+ 14->86 dropped 88 C:\Users\user\AppData\Local\...\mpnsrsgv.tmp, PE32+ 14->88 dropped 146 Uses schtasks.exe or at.exe to add and modify task schedules 16->146 24 conhost.exe 16->24         started        26 conhost.exe 18->26         started        28 schtasks.exe 18->28         started        30 conhost.exe 18->30         started        file5 148 Detected Stratum mining protocol 96->148 signatures6 process7 file8 70 C:\Windows\syswsvdrv.exe, PE32 20->70 dropped 120 Antivirus detection for dropped file 20->120 122 Multi AV Scanner detection for dropped file 20->122 124 Found evasive API chain (may stop execution after checking mutex) 20->124 126 5 other signatures 20->126 32 syswsvdrv.exe 7 30 20->32         started        signatures9 process10 dnsIp11 90 185.215.113.66, 49698, 49700, 49701 WHOLESALECONNECTIONSNL Portugal 32->90 92 189.154.139.202, 40500 UninetSAdeCVMX Mexico 32->92 94 22 other IPs or domains 32->94 62 C:\Users\user\AppData\...\3140014916.exe, PE32 32->62 dropped 64 C:\Users\user\AppData\...\1714510698.exe, PE32 32->64 dropped 66 C:\Users\user\AppData\...\1672211615.exe, PE32 32->66 dropped 68 3 other malicious files 32->68 dropped 112 Antivirus detection for dropped file 32->112 114 Multi AV Scanner detection for dropped file 32->114 116 Found evasive API chain (may stop execution after checking mutex) 32->116 118 5 other signatures 32->118 37 153301913.exe 15 32->37         started        41 3140014916.exe 32->41         started        44 1672211615.exe 14 32->44         started        46 1714510698.exe 1 32->46         started        file12 signatures13 process14 dnsIp15 72 C:\Users\user\AppData\...\1531525106.exe, PE32+ 37->72 dropped 74 C:\Users\user\AppData\Local\...\xmr[1].exe, PE32+ 37->74 dropped 128 Antivirus detection for dropped file 37->128 130 Multi AV Scanner detection for dropped file 37->130 132 Machine Learning detection for dropped file 37->132 48 1531525106.exe 3 37->48         started        98 179.43.175.195, 49715, 49718, 49719 PLI-ASCH Panama 41->98 76 C:\Users\user\AppData\...\nsis_uns5cbdd2.dll, PE32+ 41->76 dropped 134 Query firmware table information (likely to detect VMs) 41->134 136 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 41->136 138 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 41->138 142 3 other signatures 41->142 78 C:\Users\...\Windows Security Updates.exe, PE32 44->78 dropped 80 C:\Users\user\AppData\Local\...\pinf[1].exe, PE32 44->80 dropped 140 Hides that the sample has been downloaded from the Internet (zone.identifier) 44->140 52 Windows Security Updates.exe 1 44->52         started        54 Windows Security Updates.exe 44->54         started        56 Windows Security Updates.exe 44->56         started        file16 signatures17 process18 file19 58 C:\Users\user\...\winsvrupd.exe, PE32+ 48->58 dropped 100 Antivirus detection for dropped file 48->100 102 Multi AV Scanner detection for dropped file 48->102 60 C:\ProgramData\Adobe\Setup\...\setup.exe, PE32 52->60 dropped signatures20
Threat name:
Win32.Trojan.MintZard
Status:
Malicious
First seen:
2023-01-22 00:43:03 UTC
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
phorphiex
Score:
  10/10
Tags:
family:phorphiex evasion loader persistence spyware stealer trojan worm
Behaviour
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Adds Run key to start application
Loads dropped DLL
Reads user/profile data of web browsers
Windows security modification
Downloads MZ/PE file
Executes dropped EXE
Phorphiex
Windows security bypass
Malware Config
C2 Extraction:
http://185.215.113.66/
Unpacked files
SH256 hash:
5c8d519b601447d102fc9b2f83b894bf15939506a3ad8aa53fa535de36121ce7
MD5 hash:
459c987558d3380fca8c840549f83111
SHA1 hash:
7433000eeb78f9ae908e11eb67e9391622e7e5b8
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Phorpiex

Executable exe 5c8d519b601447d102fc9b2f83b894bf15939506a3ad8aa53fa535de36121ce7

(this sample)

  
Delivery method
Distributed via web download

Comments