MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 959ed7f57b49523114b54616f2f5bdb40c78cd1fcf8f506d3bc3721e833cee03. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Phorpiex


Vendor detections: 16


Intelligence 16 IOCs YARA File information Comments

SHA256 hash: 959ed7f57b49523114b54616f2f5bdb40c78cd1fcf8f506d3bc3721e833cee03
SHA3-384 hash: de2d1312297ddaec2c547e23d5866d493f715aec8f5f5288e3c6673a64f157cf976c695cb898959541453299365fa0ca
SHA1 hash: d36f6d972624b6f8b7de5553f5bc89b43f554c1a
MD5 hash: 3fade1189c46a975a19599f9bc8ce9b8
humanhash: leopard-zulu-tennessee-single
File name:3fade1189c46a975a19599f9bc8ce9b8.exe
Download: download sample
Signature Phorpiex
File size:6'656 bytes
First seen:2023-02-06 09:31:49 UTC
Last seen:2023-02-06 11:45:17 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 080d27a34deaeb58ce07978248e9f5dc (4 x Phorpiex, 1 x CoinMiner)
ssdeep 96:e0YN1t761bndKyl7ayAcR3PtboynuYUBtCt:Yt7YbN7jz3P1oynfUBM
TLSH T171D1D706BB044291E19846F0157BE24FE6AD0671031545FFE273654A7CB5372B427B7B
TrID 40.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
16.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
12.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
11.0% (.EXE) Win32 Executable (generic) (4505/5/1)
5.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter abuse_ch
Tags:exe Phorpiex

Intelligence


File Origin
# of uploads :
2
# of downloads :
193
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
phorpiex
ID:
1
File name:
3fade1189c46a975a19599f9bc8ce9b8.exe
Verdict:
Malicious activity
Analysis date:
2023-02-06 09:33:39 UTC
Tags:
loader trojan phorpiex

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Сreating synchronization primitives
Creating a file in the Windows directory
Enabling the 'hidden' option for recently created files
Creating a window
DNS request
Sending a UDP request
Creating a file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Blocking the Windows Security Center notifications
Creating a file in the mass storage device
Sending an HTTP GET request to an infection source
Enabling threat expansion on mass storage devices
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
CallSleep
EvasionGetTickCount
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
80%
Tags:
greyware shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Phorpiex, Xmrig
Detection:
malicious
Classification:
troj.evad.mine
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to check if Internet connection is working
Contains functionality to detect sleep reduction / modifications
Creates HTML files with .exe extension (expired dropper behavior)
Detected Stratum mining protocol
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after checking mutex)
Found hidden mapped module (file has been removed from disk)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Snort IDS alert for network traffic
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Phorpiex
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 799307 Sample: BJYjR10jwR.exe Startdate: 06/02/2023 Architecture: WINDOWS Score: 100 81 Snort IDS alert for network traffic 2->81 83 Antivirus detection for URL or domain 2->83 85 Antivirus detection for dropped file 2->85 87 8 other signatures 2->87 9 BJYjR10jwR.exe 28 2->9         started        14 winsvrupd.exe 2->14         started        16 powershell.exe 34 2->16         started        18 11 other processes 2->18 process3 dnsIp4 77 185.215.113.84, 49695, 49703, 49717 WHOLESALECONNECTIONSNL Portugal 9->77 79 185.215.113.66, 49692, 49699, 49701 WHOLESALECONNECTIONSNL Portugal 9->79 61 C:\Users\user\AppData\...\2587028517.exe, PE32 9->61 dropped 111 Hides that the sample has been downloaded from the Internet (zone.identifier) 9->111 20 2587028517.exe 1 1 9->20         started        63 C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+ 14->63 dropped 65 C:\Users\user\AppData\Local\...\mpnsrsgv.tmp, PE32+ 14->65 dropped 113 Writes to foreign memory regions 14->113 115 Modifies the context of a thread in another process (thread injection) 14->115 117 Maps a DLL or memory area into another process 14->117 119 Sample is not signed and drops a device driver 14->119 24 cmd.exe 14->24         started        121 Uses schtasks.exe or at.exe to add and modify task schedules 16->121 26 conhost.exe 16->26         started        28 MpCmdRun.exe 18->28         started        30 conhost.exe 18->30         started        32 schtasks.exe 18->32         started        34 3 other processes 18->34 file5 123 Detected Stratum mining protocol 77->123 signatures6 process7 file8 55 C:\Windows\sysagrsv.exe, PE32 20->55 dropped 93 Antivirus detection for dropped file 20->93 95 Multi AV Scanner detection for dropped file 20->95 97 Found evasive API chain (may stop execution after checking mutex) 20->97 101 5 other signatures 20->101 36 sysagrsv.exe 7 23 20->36         started        99 Query firmware table information (likely to detect VMs) 24->99 41 conhost.exe 28->41         started        signatures9 process10 dnsIp11 71 129.122.214.30, 40500 ZAP-AngolaAO Angola 36->71 73 118.100.68.245, 40500 TMNET-AS-APTMNetInternetServiceProviderMY Malaysia 36->73 75 24 other IPs or domains 36->75 57 C:\Users\user\AppData\...\1690319384.exe, PE32 36->57 dropped 59 C:\Users\user\AppData\...\1518423938.exe, PE32 36->59 dropped 103 Antivirus detection for dropped file 36->103 105 Multi AV Scanner detection for dropped file 36->105 107 Found evasive API chain (may stop execution after checking mutex) 36->107 109 6 other signatures 36->109 43 1518423938.exe 16 36->43         started        47 1690319384.exe 36->47         started        file12 signatures13 process14 file15 67 C:\Users\user\AppData\...\1053227632.exe, PE32+ 43->67 dropped 69 C:\Users\user\AppData\Local\...\xmr[1].exe, PE32+ 43->69 dropped 125 Antivirus detection for dropped file 43->125 127 Multi AV Scanner detection for dropped file 43->127 129 Machine Learning detection for dropped file 43->129 131 Hides that the sample has been downloaded from the Internet (zone.identifier) 43->131 49 1053227632.exe 3 43->49         started        signatures16 process17 file18 53 C:\Users\user\...\winsvrupd.exe, PE32+ 49->53 dropped 89 Antivirus detection for dropped file 49->89 91 Multi AV Scanner detection for dropped file 49->91 signatures19
Threat name:
Win32.Infostealer.ClipBanker
Status:
Malicious
First seen:
2023-02-06 09:32:08 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
24 of 26 (92.31%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
phorphiex
Score:
  10/10
Tags:
family:phorphiex evasion loader persistence trojan worm
Behaviour
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
Windows security modification
Downloads MZ/PE file
Phorphiex
Windows security bypass
Malware Config
C2 Extraction:
http://185.215.113.66/
Unpacked files
SH256 hash:
959ed7f57b49523114b54616f2f5bdb40c78cd1fcf8f506d3bc3721e833cee03
MD5 hash:
3fade1189c46a975a19599f9bc8ce9b8
SHA1 hash:
d36f6d972624b6f8b7de5553f5bc89b43f554c1a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Phorpiex

Executable exe 959ed7f57b49523114b54616f2f5bdb40c78cd1fcf8f506d3bc3721e833cee03

(this sample)

Comments