MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 70a4afab44d6a9ecd7f42ab77972be074dec8383a47a2011eb0133a230a4fae3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Phorpiex


Vendor detections: 14


Intelligence 14 IOCs YARA 7 File information Comments

SHA256 hash: 70a4afab44d6a9ecd7f42ab77972be074dec8383a47a2011eb0133a230a4fae3
SHA3-384 hash: d23360295fc181a14491206c2988763bb9903d63f3723269340e2393e67e7ecfcd18fbd6bf396daf526265c713de4de5
SHA1 hash: 74c021250ef2c027deb141d8f8b35329de082209
MD5 hash: 8bf379efd813e2b19e3c0abf2dc08f05
humanhash: april-aspen-foxtrot-winner
File name:Document.doc.lnk
Download: download sample
Signature Phorpiex
File size:2'067 bytes
First seen:2026-01-06 07:50:12 UTC
Last seen:Never
File type:Shortcut (lnk) lnk
MIME type:application/x-ms-shortcut
ssdeep 24:8VVJqMFXuvawAgqx+/ntSy9kerUMkWI9wCc5QgkgVBS9ZmT:8VemaquoyOerHypgkgVw9ZY
Threatray 2'573 similar samples on MalwareBazaar
TLSH T12541C1161BD64725D3F84E3AE8BBE71099A97C1AFB138F5D0181929818516149C68F3E
Magika lnk
Reporter abuse_ch
Tags:lnk Phorpiex

Intelligence


File Origin
# of uploads :
1
# of downloads :
50
Origin country :
SE SE
Vendor Threat Intelligence
Malware configuration found for:
LNK
Details
LNK
a command line and any observed urls
Verdict:
Malicious
Score:
94.9%
Tags:
trojan shell sage
Result
Verdict:
Malicious
File Type:
LNK File - Malicious
Payload URLs
URL
File name
http://178.16.54.109/spl.exe
LNK File
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
autorun cmd dropper lolbin masquerade powershell powershell
Verdict:
Malicious
File Type:
lnk
First seen:
2026-01-04T14:57:00Z UTC
Last seen:
2026-01-08T06:29:00Z UTC
Hits:
~10000
Detections:
HEUR:Trojan.WinLNK.Shino.gen HEUR:Trojan.WinLNK.Agent.gen HEUR:Trojan.Multi.Powedon.a Trojan-Ransom.Win32.Encoder.sb Trojan-Downloader.WinLNK.Agent.sb Trojan.WinLNK.Agent.sb HEUR:Trojan-Ransom.Win32.Generic HEUR:Trojan-Downloader.WinLNK.Powedon.b Trojan-Ransom.Win32.Agent.sb Trojan.Win32.Vimditator.sb Trojan.Win32.DelShad.sb HEUR:Trojan-Ransom.Win64.Generic PDM:Trojan.Win32.Generic Trojan-Ransom.Win64.Agent.mona HEUR:Trojan.Multi.Agent.gen Trojan-Downloader.PowerShell.Agent.sb Trojan.Win32.Agent.sb HEUR:Trojan-Downloader.Win32.Agent.gen
Result
Threat name:
Detection:
malicious
Classification:
rans.spre.troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
Contains functionality to enumerate network shares of other devices
Creates files in the recycle bin to hide itself
Deletes shadow drive data (may be related to ransomware)
Drops PE files to the user root directory
Found evasive API chain (may stop execution after checking mutex)
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Powershell drops PE file
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to download and execute files (via powershell)
Uses an obfuscated file name to hide its real file extension (double extension)
Windows shortcut file (LNK) contains suspicious command line arguments
Windows shortcut file (LNK) starts blacklisted processes
Writes a notice file (html or txt) to demand a ransom
Yara detected malicious lnk
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1845338 Sample: Document.doc.lnk Startdate: 06/01/2026 Architecture: WINDOWS Score: 100 80 Suricata IDS alerts for network traffic 2->80 82 Malicious sample detected (through community Yara rule) 2->82 84 Antivirus detection for URL or domain 2->84 86 13 other signatures 2->86 12 cmd.exe 1 2->12         started        15 winsvc.exe 2->15         started        17 winsvc.exe 2->17         started        process3 signatures4 112 Windows shortcut file (LNK) starts blacklisted processes 12->112 114 Suspicious powershell command line found 12->114 116 Tries to download and execute files (via powershell) 12->116 118 Bypasses PowerShell execution policy 12->118 19 powershell.exe 14 29 12->19         started        23 conhost.exe 1 12->23         started        process5 file6 50 C:\Users\user\windrv.exe, PE32 19->50 dropped 88 Drops PE files to the user root directory 19->88 90 Loading BitLocker PowerShell Module 19->90 92 Powershell drops PE file 19->92 25 windrv.exe 1 2 19->25         started        signatures7 process8 file9 60 C:\Users\user\winsvc.exe, PE32 25->60 dropped 102 Multi AV Scanner detection for dropped file 25->102 104 Found evasive API chain (may stop execution after checking mutex) 25->104 106 Drops PE files to the user root directory 25->106 108 Hides that the sample has been downloaded from the Internet (zone.identifier) 25->108 29 winsvc.exe 15 25->29         started        signatures10 process11 file12 62 C:\Users\user\AppData\...\2017924000.exe, PE32 29->62 dropped 64 C:\Users\user\AppData\Local\...\lfuck[1].exe, PE32 29->64 dropped 120 Multi AV Scanner detection for dropped file 29->120 122 Found evasive API chain (may stop execution after checking mutex) 29->122 124 Hides that the sample has been downloaded from the Internet (zone.identifier) 29->124 33 2017924000.exe 1 29->33         started        signatures13 process14 signatures15 72 Multi AV Scanner detection for dropped file 33->72 74 Contains functionality to enumerate network shares of other devices 33->74 76 Deletes shadow drive data (may be related to ransomware) 33->76 78 Writes a notice file (html or txt) to demand a ransom 33->78 36 2017924000.exe 71 33->36         started        41 conhost.exe 33->41         started        process16 dnsIp17 66 192.168.2.100 unknown unknown 36->66 68 192.168.2.101 unknown unknown 36->68 70 98 other IPs or domains 36->70 52 C:\Users\user\Documents\IPKGELNTQY.pdf.Reco, DOS 36->52 dropped 54 C:\Users\Public\Downloads\README.Reco.txt, ASCII 36->54 dropped 56 C:\Users\Public\Documents\README.Reco.txt, ASCII 36->56 dropped 58 9 other malicious files 36->58 dropped 94 Windows shortcut file (LNK) starts blacklisted processes 36->94 96 Creates files in the recycle bin to hide itself 36->96 98 Found Tor onion address 36->98 100 2 other signatures 36->100 43 cmd.exe 1 36->43         started        46 conhost.exe 36->46         started        file18 signatures19 process20 signatures21 110 Deletes shadow drive data (may be related to ransomware) 43->110 48 conhost.exe 43->48         started        process22
Verdict:
Malware
YARA:
2 match(es)
Tags:
Batch Command Execution: CMD in LNK Execution: PowerShell in LNK LNK LOLBin LOLBin:cmd.exe Malicious PowerShell PowerShell Call T1059.001 T1059.003 T1202: Indirect Command Execution T1204.002
Threat name:
Shortcut.Trojan.WinLnk
Status:
Malicious
First seen:
2026-01-04 17:53:56 UTC
File Type:
Binary
AV detection:
23 of 36 (63.89%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery execution persistence ransomware
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Sets desktop wallpaper using registry
Adds Run key to start application
Command and Scripting Interpreter: PowerShell
Enumerates connected drives
Checks computer location settings
Executes dropped EXE
Badlisted process makes network request
Downloads MZ/PE file
Renames multiple (174) files with added filename extension
Malware Config
Dropper Extraction:
http://178.16.54.109/spl.exe
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Download_in_LNK
Author:@bartblaze
Description:Identifies download artefacts in shortcut (LNK) files.
Rule name:Execution_in_LNK
Author:@bartblaze
Description:Identifies execution artefacts in shortcut (LNK) files.
Rule name:LNK_sospechosos
Author:Germán Fernández
Description:Detecta archivos .lnk sospechosos
Rule name:PS_in_LNK
Author:@bartblaze
Description:Identifies PowerShell artefacts in shortcut (LNK) files.
Rule name:SUSP_LNK_CMD
Author:SECUINFRA Falcon Team
Description:Detects the reference to cmd.exe inside an lnk file, which is suspicious
Rule name:SUSP_LNK_PowerShell
Author:SECUINFRA Falcon Team
Description:Detects the reference to powershell inside an lnk file, which is suspicious
Rule name:SUSP_LNK_SuspiciousCommands
Author:Florian Roth (Nextron Systems)
Description:Detects LNK file with suspicious content

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments