MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 78a973ace68c9666e5ec28c53be0d2d36bde2d419c10fa6ed939156d199a18ef. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Phorpiex


Vendor detections: 15


Intelligence 15 IOCs YARA File information Comments

SHA256 hash: 78a973ace68c9666e5ec28c53be0d2d36bde2d419c10fa6ed939156d199a18ef
SHA3-384 hash: 094a93c301e1bcaaabc572b388543bd8cb823ea98b9d3b32568519654b472cc769a9efe9aabe32ff0605a8cd16668e4c
SHA1 hash: 1ad534abb623d127685f6a4dd7e1fdd751940e52
MD5 hash: e085c86990a0c1bd74cc290eaef3144f
humanhash: mountain-emma-september-vermont
File name:e085c86990a0c1bd74cc290eaef3144f.exe
Download: download sample
Signature Phorpiex
File size:6'656 bytes
First seen:2023-01-22 17:30:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 080d27a34deaeb58ce07978248e9f5dc (4 x Phorpiex, 1 x CoinMiner)
ssdeep 96:ebd1t761bndKil7aBcxu0PtboynuYUBtCt:8t7Yb975u0P1oynfUBM
Threatray 17'738 similar samples on MalwareBazaar
TLSH T179D1B506BB040690E1D84AF01576A24FDAFD4A72031545FFE3B2254A6CB53B6B427B7B
TrID 40.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
16.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
12.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
11.0% (.EXE) Win32 Executable (generic) (4505/5/1)
5.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter abuse_ch
Tags:exe Phorpiex

Intelligence


File Origin
# of uploads :
1
# of downloads :
232
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
phorpiex
ID:
1
File name:
e085c86990a0c1bd74cc290eaef3144f.exe
Verdict:
Malicious activity
Analysis date:
2023-01-22 17:35:40 UTC
Tags:
loader trojan phorpiex

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Сreating synchronization primitives
Creating a file in the Windows directory
Enabling the 'hidden' option for recently created files
Creating a window
Sending a custom TCP request
DNS request
Sending a UDP request
Creating a file
Changing an executable file
Query of malicious DNS domain
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Blocking the Windows Security Center notifications
Creating a file in the mass storage device
Sending an HTTP GET request to an infection source
Enabling threat expansion on mass storage devices
Infecting executable files
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
CallSleep
EvasionGetTickCount
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
clipbanker greyware phorpiex shell32.dll tiny
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Phorpiex, RHADAMANTHYS, Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Checks if the current machine is a virtual machine (disk enumeration)
Contain functionality to detect virtual machines
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to check if Internet connection is working
Contains functionality to detect sleep reduction / modifications
Contains functionality to detect virtual machines (IN, VMware)
Contains functionality to hide a thread from the debugger
Detected Stratum mining protocol
Drops executables to the windows directory (C:\Windows) and starts them
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking mutex)
Found evasive API chain (may stop execution after checking system information)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found hidden mapped module (file has been removed from disk)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Searches for specific processes (likely to inject)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Phorpiex
Yara detected RHADAMANTHYS Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 789300 Sample: fCb55u2aTh.exe Startdate: 22/01/2023 Architecture: WINDOWS Score: 100 117 Snort IDS alert for network traffic 2->117 119 Antivirus detection for URL or domain 2->119 121 Antivirus detection for dropped file 2->121 123 13 other signatures 2->123 10 fCb55u2aTh.exe 18 2->10         started        15 winsvrupd.exe 2->15         started        17 powershell.exe 2->17         started        19 12 other processes 2->19 process3 dnsIp4 111 twizt.org 185.215.113.84, 49713, 49716, 49732 WHOLESALECONNECTIONSNL Portugal 10->111 87 C:\Users\user\AppData\...\3110516493.exe, PE32 10->87 dropped 89 C:\Users\user\AppData\Local\...\tpp[1].exe, PE32 10->89 dropped 155 Hides that the sample has been downloaded from the Internet (zone.identifier) 10->155 21 3110516493.exe 1 1 10->21         started        91 C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+ 15->91 dropped 93 C:\Users\user\AppData\Local\...\mpnsrsgv.tmp, PE32+ 15->93 dropped 157 Writes to foreign memory regions 15->157 159 Modifies the context of a thread in another process (thread injection) 15->159 161 Maps a DLL or memory area into another process 15->161 163 Sample is not signed and drops a device driver 15->163 25 cmd.exe 15->25         started        165 Uses schtasks.exe or at.exe to add and modify task schedules 17->165 27 conhost.exe 17->27         started        113 192.168.2.1 unknown unknown 19->113 167 Query firmware table information (likely to detect VMs) 19->167 29 MpCmdRun.exe 19->29         started        31 WerFault.exe 19->31         started        33 conhost.exe 19->33         started        35 4 other processes 19->35 file5 169 Detected Stratum mining protocol 111->169 signatures6 process7 file8 69 C:\Windows\syswsvdrv.exe, PE32 21->69 dropped 125 Antivirus detection for dropped file 21->125 127 Multi AV Scanner detection for dropped file 21->127 129 Found evasive API chain (may stop execution after checking mutex) 21->129 133 5 other signatures 21->133 37 syswsvdrv.exe 7 31 21->37         started        131 Query firmware table information (likely to detect VMs) 25->131 42 conhost.exe 29->42         started        signatures9 process10 dnsIp11 105 185.215.113.66, 49718, 49720, 49721 WHOLESALECONNECTIONSNL Portugal 37->105 107 189.176.136.171, 40500 UninetSAdeCVMX Mexico 37->107 109 51 other IPs or domains 37->109 71 C:\Users\user\AppData\Local\...\433813033.exe, PE32 37->71 dropped 73 C:\Users\user\AppData\Local\...\293319628.exe, PE32 37->73 dropped 75 C:\Users\user\AppData\...\2075311076.exe, PE32 37->75 dropped 77 3 other malicious files 37->77 dropped 135 Antivirus detection for dropped file 37->135 137 Multi AV Scanner detection for dropped file 37->137 139 Found evasive API chain (may stop execution after checking mutex) 37->139 141 5 other signatures 37->141 44 293319628.exe 1 37->44         started        49 193144740.exe 37->49         started        51 433813033.exe 14 37->51         started        53 2075311076.exe 37->53         started        file12 signatures13 process14 dnsIp15 115 179.43.175.195, 49728, 49735, 80 PLI-ASCH Panama 44->115 95 C:\Users\user\AppData\...\nsis_uns5a1017.dll, PE32+ 44->95 dropped 171 Query firmware table information (likely to detect VMs) 44->171 173 Found evasive API chain (may stop execution after checking system information) 44->173 175 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 44->175 185 11 other signatures 44->185 55 rundll32.exe 44->55         started        97 C:\Users\user\AppData\...\1100839090.exe, PE32+ 49->97 dropped 99 C:\Users\user\AppData\Local\...\xmr[1].exe, PE32+ 49->99 dropped 177 Antivirus detection for dropped file 49->177 179 Multi AV Scanner detection for dropped file 49->179 181 Machine Learning detection for dropped file 49->181 58 1100839090.exe 49->58         started        101 C:\Users\...\Windows Security Updates.exe, PE32 51->101 dropped 103 C:\Users\user\AppData\Local\...\pinf[1].exe, PE32 51->103 dropped 183 Hides that the sample has been downloaded from the Internet (zone.identifier) 51->183 61 Windows Security Updates.exe 1 51->61         started        63 Windows Security Updates.exe 51->63         started        65 Windows Security Updates.exe 51->65         started        file16 signatures17 process18 file19 143 System process connects to network (likely due to code injection or exploit) 55->143 145 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 55->145 147 Tries to steal Mail credentials (via file / registry access) 55->147 153 2 other signatures 55->153 67 WerFault.exe 55->67         started        79 C:\Users\user\...\winsvrupd.exe, PE32+ 58->79 dropped 149 Antivirus detection for dropped file 58->149 151 Multi AV Scanner detection for dropped file 58->151 81 C:\ProgramData\Adobe\Setup\...\setup.exe, PE32 61->81 dropped 83 C:\ProgramData\Adobe\...\AdobeARMHelper.exe, PE32 61->83 dropped 85 C:\ProgramData\Adobe\...\AdobeARMHelper.exe, PE32 61->85 dropped signatures20 process21
Threat name:
Win32.Trojan.MintZard
Status:
Malicious
First seen:
2023-01-21 04:11:00 UTC
AV detection:
29 of 37 (78.38%)
Threat level:
  5/5
Result
Malware family:
phorphiex
Score:
  10/10
Tags:
family:phorphiex evasion loader persistence spyware stealer trojan worm
Behaviour
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Adds Run key to start application
Loads dropped DLL
Reads user/profile data of web browsers
Windows security modification
Downloads MZ/PE file
Executes dropped EXE
Phorphiex
Windows security bypass
Malware Config
C2 Extraction:
http://185.215.113.66/
Unpacked files
SH256 hash:
78a973ace68c9666e5ec28c53be0d2d36bde2d419c10fa6ed939156d199a18ef
MD5 hash:
e085c86990a0c1bd74cc290eaef3144f
SHA1 hash:
1ad534abb623d127685f6a4dd7e1fdd751940e52
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Phorpiex

Executable exe 78a973ace68c9666e5ec28c53be0d2d36bde2d419c10fa6ed939156d199a18ef

(this sample)

  
Delivery method
Distributed via web download

Comments