MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6b7d70ca7d02133afbc24eeb585f2921bc35c01b23b90a66f515290c49cf0952. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Phobos


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments 1

SHA256 hash: 6b7d70ca7d02133afbc24eeb585f2921bc35c01b23b90a66f515290c49cf0952
SHA3-384 hash: 1d382741e3d32acd0cf5a0424476eb007df07852e312c5514c48a676a9b24287f73490790d7a2e942346e3b576050326
SHA1 hash: 733ec0a491555e4563839ef273b66cb94f0c4163
MD5 hash: a53e1725d0d8f8c4616c625e113d3426
humanhash: wyoming-moon-one-blue
File name:6b7d70ca7d02133afbc24eeb585f2921bc35c01b23b90a66f515290c49cf0952
Download: download sample
Signature Phobos
File size:61'440 bytes
First seen:2021-04-12 08:35:53 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 851a0ba8fbb71710075bdfe6dcef92eb (67 x Phobos, 2 x Worm.Ramnit)
ssdeep 1536:kNeRBl5PT/rx1mzwRMSTdLpJS2gKBiEyfND:kQRrmzwR5J7guMl
Threatray 10 similar samples on MalwareBazaar
TLSH 4253CF5AA0A980B2CDB14670293A2F5F5EFE600540B488874F3D8D9B7FD5172D73A37A
Reporter fbgwls245
Tags:Phobos POLSAT Ransomware

Intelligence


File Origin
# of uploads :
1
# of downloads :
1'381
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6b7d70ca7d02133afbc24eeb585f2921bc35c01b23b90a66f515290c49cf0952
Verdict:
Malicious activity
Analysis date:
2021-04-12 08:39:19 UTC
Tags:
ransomware phobos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a service
Creating a file
Launching cmd.exe command interpreter
Creating a process with a hidden window
Modifying an executable file
Changing a file
Moving a file to the Program Files subdirectory
Sending a UDP request
Creating a file in the %AppData% subdirectories
Replacing executable files
Creating a file in the Program Files directory
Creating a file in the Program Files subdirectories
Launching the process to change network settings
Launching the process to change the firewall settings
Launching a process
Creating a file in the Windows subdirectories
Creating a window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Creating a file in the mass storage device
Deleting volume shadow copies
Enabling autorun for a service
Preventing system recovery
Enabling autorun by creating a file
Infecting executable files
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Phobos Ransomware
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
rans.spre.adwa.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Creates files in the recycle bin to hide itself
Creates files inside the volume driver (system volume information)
Deletes shadow drive data (may be related to ransomware)
Deletes the backup plan of Windows
Drops PE files to the startup folder
Infects executable files (exe, dll, sys, html)
Machine Learning detection for sample
May disable shadow drive data (uses vssadmin)
Modifies the windows firewall
Multi AV Scanner detection for submitted file
Sigma detected: Delete shadow copy via WMIC
Uses bcdedit to modify the Windows boot settings
Uses netsh to modify the Windows network and firewall settings
Writes many files with high entropy
Yara detected Phobos
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 385329 Sample: TYZ4Y3wt9f Startdate: 12/04/2021 Architecture: WINDOWS Score: 100 49 Antivirus / Scanner detection for submitted sample 2->49 51 Multi AV Scanner detection for submitted file 2->51 53 Yara detected Phobos 2->53 55 3 other signatures 2->55 7 TYZ4Y3wt9f.exe 2 501 2->7         started        12 wbuser.exe 3 2->12         started        14 vdsldr.exe 2->14         started        16 5 other processes 2->16 process3 dnsIp4 47 192.168.2.1 unknown unknown 7->47 39 C:\Users\user\AppData\...\TYZ4Y3wt9f.exe, PE32 7->39 dropped 41 C:\Users\user\AppData\Local\TYZ4Y3wt9f.exe, PE32 7->41 dropped 43 C:\ProgramData\Microsoft\...\TYZ4Y3wt9f.exe, PE32 7->43 dropped 45 303 other files (293 malicious) 7->45 dropped 65 Creates files in the recycle bin to hide itself 7->65 67 Drops PE files to the startup folder 7->67 69 Writes many files with high entropy 7->69 71 Infects executable files (exe, dll, sys, html) 7->71 18 cmd.exe 1 7->18         started        21 cmd.exe 1 7->21         started        23 TYZ4Y3wt9f.exe 7->23         started        73 Creates files inside the volume driver (system volume information) 12->73 file5 signatures6 process7 signatures8 57 May disable shadow drive data (uses vssadmin) 18->57 59 Deletes shadow drive data (may be related to ransomware) 18->59 61 Uses netsh to modify the Windows network and firewall settings 18->61 63 3 other signatures 18->63 25 bcdedit.exe 1 18->25         started        27 bcdedit.exe 1 18->27         started        29 conhost.exe 18->29         started        37 3 other processes 18->37 31 netsh.exe 3 21->31         started        33 netsh.exe 3 21->33         started        35 conhost.exe 21->35         started        process9
Threat name:
Win32.Ransomware.Phobos
Status:
Malicious
First seen:
2021-04-05 06:37:00 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:phobos evasion persistence ransomware spyware stealer
Behaviour
Checks SCSI registry key(s)
Interacts with shadow copies
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Adds Run key to start application
Drops desktop.ini file(s)
Drops startup file
Reads user/profile data of web browsers
Deletes backup catalog
Modifies Windows Firewall
Modifies extensions of user files
Deletes shadow copies
Modifies boot configuration data using bcdedit
Phobos
Suspicious use of NtCreateUserProcessOtherParentProcess
Unpacked files
SH256 hash:
6b7d70ca7d02133afbc24eeb585f2921bc35c01b23b90a66f515290c49cf0952
MD5 hash:
a53e1725d0d8f8c4616c625e113d3426
SHA1 hash:
733ec0a491555e4563839ef273b66cb94f0c4163
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_Phobos
Author:ditekshen
Description:Detects Phobos ransomware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Phobos

Executable exe 6b7d70ca7d02133afbc24eeb585f2921bc35c01b23b90a66f515290c49cf0952

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-04-14 16:09:58 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0001.032] Anti-Behavioral Analysis::Timing/Delay Check GetTickCount
1) [B0001.033] Anti-Behavioral Analysis::Timing/Delay Check QueryPerformanceCounter
2) [B0030.002] Command and Control::Receive Data
3) [C0002.012] Communication Micro-objective::Create Request::HTTP Communication
4) [C0002.017] Communication Micro-objective::Get Response::HTTP Communication
5) [C0002.008] Communication Micro-objective::WinHTTP::HTTP Communication
6) [C0003.001] Communication Micro-objective::Create Pipe::Interprocess Communication
7) [C0003.004] Communication Micro-objective::Write Pipe::Interprocess Communication
8) [C0001.012] Communication Micro-objective::Get Socket Status::Socket Communication
9) [C0001.006] Communication Micro-objective::Receive Data::Socket Communication
10) [C0001.001] Communication Micro-objective::Set Socket Config::Socket Communication
11) [C0029.003] Cryptography Micro-objective::SHA256::Cryptographic Hash
12) [C0027.009] Cryptography Micro-objective::RC4::Encrypt Data
13) [C0028.002] Cryptography Micro-objective::RC4 KSA::Encryption Key
14) [C0026.002] Data Micro-objective::XOR::Encode Data
15) [C0030.001] Data Micro-objective::MurmurHash::Non-Cryptographic Hash
17) [C0045] File System Micro-objective::Copy File
18) [C0047] File System Micro-objective::Delete File
19) [C0049] File System Micro-objective::Get File Attributes
20) [C0051] File System Micro-objective::Read File
21) [C0050] File System Micro-objective::Set File Attributes
22) [C0052] File System Micro-objective::Writes File
23) [C0036.004] Operating System Micro-objective::Create Registry Key::Registry
24) [C0036.003] Operating System Micro-objective::Open Registry Key::Registry
25) [C0036.006] Operating System Micro-objective::Query Registry Value::Registry
26) [C0036.001] Operating System Micro-objective::Set Registry Key::Registry
27) [C0043] Process Micro-objective::Check Mutex
28) [C0042] Process Micro-objective::Create Mutex
29) [C0017] Process Micro-objective::Create Process
30) [C0038] Process Micro-objective::Create Thread
31) [C0018] Process Micro-objective::Terminate Process