MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8710ad8fb2938326655335455987aa17961b2496a345a7ed9f4bbfcb278212bc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Phobos


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments 1

SHA256 hash: 8710ad8fb2938326655335455987aa17961b2496a345a7ed9f4bbfcb278212bc
SHA3-384 hash: e9dbd87b06e87719bf12f8351df127c0f14a4d82a95971f58793643c84be05581a307e884ad683db5f60a25bb26a97f7
SHA1 hash: 5875f07b7b8174284ca15e4d5f53942e0d736024
MD5 hash: ab7b66ee5385cb473b9c15db3e239692
humanhash: delaware-charlie-moon-papa
File name:1.exe
Download: download sample
Signature Phobos
File size:63'504 bytes
First seen:2021-05-06 11:59:19 UTC
Last seen:2021-05-06 12:00:52 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 851a0ba8fbb71710075bdfe6dcef92eb (67 x Phobos, 2 x Worm.Ramnit)
ssdeep 1536:XNeRBl5PT/rx1mzwRMSTdLpJil7Qi9TMk:XQRrmzwR5J67Qi9TMk
Threatray 11 similar samples on MalwareBazaar
TLSH 1753BF4570AD94B2CDB14970253A6F5F8ABF640140B888974F394D8A3ED5136EB3E376
Reporter starsSk87264403
Tags:Phobos Ransomware

Intelligence


File Origin
# of uploads :
2
# of downloads :
1'324
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
lsass.exe
Verdict:
Malicious activity
Analysis date:
2021-05-06 11:35:23 UTC
Tags:
ransomware phobos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Deleting a recently created file
Changing a file
Launching a service
Creating a file
Launching cmd.exe command interpreter
Creating a process with a hidden window
Creating a file in the Program Files subdirectories
Sending a UDP request
Modifying an executable file
Launching the process to change network settings
Creating a file in the %AppData% subdirectories
Launching the process to change the firewall settings
Creating a file in the Program Files directory
Launching a process
Creating a file in the Windows subdirectories
Moving a file to the Program Files subdirectory
Replacing executable files
Creating a window
Using the Windows Management Instrumentation requests
Network activity
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Creating a file in the mass storage device
Deleting volume shadow copies
Enabling autorun for a service
Preventing system recovery
Enabling autorun by creating a file
Encrypting user's files
Infecting executable files
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
rans.spre.adwa.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Creates autostart registry keys with suspicious names
Creates files in the recycle bin to hide itself
Creates files inside the volume driver (system volume information)
Deletes shadow drive data (may be related to ransomware)
Deletes the backup plan of Windows
Drops PE files to the startup folder
Infects executable files (exe, dll, sys, html)
Machine Learning detection for sample
May disable shadow drive data (uses vssadmin)
Modifies the windows firewall
Multi AV Scanner detection for submitted file
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: Modification of Boot Configuration
Sigma detected: Shadow Copies Deletion Using Operating Systems Utilities
Sigma detected: WannaCry Ransomware
Submitted sample is a known malware sample
Uses bcdedit to modify the Windows boot settings
Uses netsh to modify the Windows network and firewall settings
Writes many files with high entropy
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 405932 Sample: 1.exe Startdate: 06/05/2021 Architecture: WINDOWS Score: 100 49 Sigma detected: WannaCry Ransomware 2->49 51 Antivirus / Scanner detection for submitted sample 2->51 53 Multi AV Scanner detection for submitted file 2->53 55 5 other signatures 2->55 7 1.exe 2 501 2->7         started        12 wbengine.exe 3 2->12         started        14 vdsldr.exe 2->14         started        16 5 other processes 2->16 process3 dnsIp4 47 192.168.2.1 unknown unknown 7->47 39 C:\Users\user\AppData\Roaming\...\1.exe, PE32 7->39 dropped 41 C:\Users\user\AppData\Local\1.exe, PE32 7->41 dropped 43 C:\ProgramData\Microsoft\Windows\...\1.exe, PE32 7->43 dropped 45 480 other files (471 malicious) 7->45 dropped 69 Submitted sample is a known malware sample 7->69 71 Creates files in the recycle bin to hide itself 7->71 73 Creates autostart registry keys with suspicious names 7->73 77 3 other signatures 7->77 18 cmd.exe 1 7->18         started        21 cmd.exe 1 7->21         started        23 1.exe 7->23         started        75 Creates files inside the volume driver (system volume information) 12->75 file5 signatures6 process7 signatures8 57 May disable shadow drive data (uses vssadmin) 18->57 59 Deletes shadow drive data (may be related to ransomware) 18->59 61 Uses netsh to modify the Windows network and firewall settings 18->61 63 Modifies the windows firewall 18->63 25 netsh.exe 3 18->25         started        27 netsh.exe 3 18->27         started        29 conhost.exe 18->29         started        65 Uses bcdedit to modify the Windows boot settings 21->65 67 Deletes the backup plan of Windows 21->67 31 bcdedit.exe 1 21->31         started        33 bcdedit.exe 1 21->33         started        35 conhost.exe 21->35         started        37 3 other processes 21->37 process9
Threat name:
Win32.Ransomware.Phobos
Status:
Malicious
First seen:
2021-05-06 12:00:13 UTC
File Type:
PE (Exe)
AV detection:
42 of 47 (89.36%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:phobos evasion persistence ransomware spyware stealer
Behaviour
Checks SCSI registry key(s)
Interacts with shadow copies
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Adds Run key to start application
Drops desktop.ini file(s)
Drops startup file
Reads user/profile data of web browsers
Deletes backup catalog
Modifies Windows Firewall
Modifies extensions of user files
Deletes shadow copies
Modifies boot configuration data using bcdedit
Phobos
Suspicious use of NtCreateUserProcessOtherParentProcess
Unpacked files
SH256 hash:
8710ad8fb2938326655335455987aa17961b2496a345a7ed9f4bbfcb278212bc
MD5 hash:
ab7b66ee5385cb473b9c15db3e239692
SHA1 hash:
5875f07b7b8174284ca15e4d5f53942e0d736024
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_Phobos
Author:ditekshen
Description:Detects Phobos ransomware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-06 11:59:46 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0001.032] Anti-Behavioral Analysis::Timing/Delay Check GetTickCount
1) [B0001.033] Anti-Behavioral Analysis::Timing/Delay Check QueryPerformanceCounter
2) [B0030.002] Command and Control::Receive Data
3) [C0002.012] Communication Micro-objective::Create Request::HTTP Communication
4) [C0002.017] Communication Micro-objective::Get Response::HTTP Communication
5) [C0002.008] Communication Micro-objective::WinHTTP::HTTP Communication
6) [C0003.001] Communication Micro-objective::Create Pipe::Interprocess Communication
7) [C0003.004] Communication Micro-objective::Write Pipe::Interprocess Communication
8) [C0001.012] Communication Micro-objective::Get Socket Status::Socket Communication
9) [C0001.006] Communication Micro-objective::Receive Data::Socket Communication
10) [C0001.001] Communication Micro-objective::Set Socket Config::Socket Communication
11) [C0029.003] Cryptography Micro-objective::SHA256::Cryptographic Hash
12) [C0027.009] Cryptography Micro-objective::RC4::Encrypt Data
13) [C0028.002] Cryptography Micro-objective::RC4 KSA::Encryption Key
14) [C0026.002] Data Micro-objective::XOR::Encode Data
15) [C0030.001] Data Micro-objective::MurmurHash::Non-Cryptographic Hash
17) [C0045] File System Micro-objective::Copy File
18) [C0047] File System Micro-objective::Delete File
19) [C0049] File System Micro-objective::Get File Attributes
20) [C0051] File System Micro-objective::Read File
21) [C0050] File System Micro-objective::Set File Attributes
22) [C0052] File System Micro-objective::Writes File
23) [C0036.004] Operating System Micro-objective::Create Registry Key::Registry
24) [C0036.003] Operating System Micro-objective::Open Registry Key::Registry
25) [C0036.006] Operating System Micro-objective::Query Registry Value::Registry
26) [C0036.001] Operating System Micro-objective::Set Registry Key::Registry
27) [C0043] Process Micro-objective::Check Mutex
28) [C0042] Process Micro-objective::Create Mutex
29) [C0017] Process Micro-objective::Create Process
30) [C0038] Process Micro-objective::Create Thread
31) [C0018] Process Micro-objective::Terminate Process