MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a1650255f850fabb19b9b75865cef9bd45d89a48390f585f3587da14b7484908. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Phorpiex


Vendor detections: 16


Intelligence 16 IOCs YARA File information Comments

SHA256 hash: a1650255f850fabb19b9b75865cef9bd45d89a48390f585f3587da14b7484908
SHA3-384 hash: d0e95b6c0ae506de6bdc157cab941dfad2a05d9064ea14de4b11a585eb6fef4bf99bbb18b12eb65a7b0f6c29c78068a3
SHA1 hash: 597fb8aafd9d1d0ab221c6d8291246f43c9ade7e
MD5 hash: a86bbe655021fd2f6263011c02a0070d
humanhash: lion-nuts-low-seven
File name:file
Download: download sample
Signature Phorpiex
File size:11'264 bytes
First seen:2023-02-15 14:58:52 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c9d641fea3638f857511ed0e440b2eed (1 x Phorpiex)
ssdeep 96:S5fKGbUuMszosDmzzGNaU9UGkQaHzVI3b+VIZPtboynuYUi82Ct4Le:4ZX1FYG+jiTZP1oynfUi8xSe
Threatray 68 similar samples on MalwareBazaar
TLSH T13C32002F7A094237EA64E235E0769655F28DF23332202EDBC8EB068C4D1F943F44566E
TrID 40.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
16.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
12.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
11.0% (.EXE) Win32 Executable (generic) (4505/5/1)
5.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter jstrosch
Tags:exe Phorpiex

Intelligence


File Origin
# of uploads :
1
# of downloads :
203
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
phorpiex
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-02-15 15:03:16 UTC
Tags:
loader trojan phorpiex

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Сreating synchronization primitives
Creating a file in the Windows directory
Enabling the 'hidden' option for recently created files
Creating a window
Query of malicious DNS domain
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Blocking the Windows Security Center notifications
Creating a file in the mass storage device
Sending an HTTP GET request to an infection source
Enabling threat expansion on mass storage devices
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CallSleep
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
83%
Tags:
greyware shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Phorpiex, RHADAMANTHYS, Xmrig
Detection:
malicious
Classification:
rans.troj.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to check if Internet connection is working
Contains functionality to detect sleep reduction / modifications
Detected Stratum mining protocol
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after checking mutex)
Found hidden mapped module (file has been removed from disk)
Found potential ransomware demand text
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Phorpiex
Yara detected RHADAMANTHYS Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 809143 Sample: file.exe Startdate: 16/02/2023 Architecture: WINDOWS Score: 100 91 Snort IDS alert for network traffic 2->91 93 Antivirus detection for URL or domain 2->93 95 Antivirus detection for dropped file 2->95 97 13 other signatures 2->97 9 file.exe 18 2->9         started        14 winsvrupd.exe 2->14         started        16 powershell.exe 33 2->16         started        18 13 other processes 2->18 process3 dnsIp4 81 185.215.113.84, 49700, 49705, 49719 WHOLESALECONNECTIONSNL Portugal 9->81 83 twizt.ru 185.215.113.66, 49698, 49702, 49703 WHOLESALECONNECTIONSNL Portugal 9->83 63 C:\Users\user\AppData\...\2135628241.exe, PE32 9->63 dropped 65 C:\Users\user\AppData\Local\...\newtpp[1].exe, PE32 9->65 dropped 117 Hides that the sample has been downloaded from the Internet (zone.identifier) 9->117 20 2135628241.exe 1 1 9->20         started        67 C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+ 14->67 dropped 69 C:\Users\user\AppData\Local\...\mpnsrsgv.tmp, PE32+ 14->69 dropped 119 Writes to foreign memory regions 14->119 121 Modifies the context of a thread in another process (thread injection) 14->121 123 Maps a DLL or memory area into another process 14->123 125 Sample is not signed and drops a device driver 14->125 24 cmd.exe 14->24         started        127 Uses schtasks.exe or at.exe to add and modify task schedules 16->127 26 conhost.exe 16->26         started        129 Query firmware table information (likely to detect VMs) 18->129 28 MpCmdRun.exe 18->28         started        30 conhost.exe 18->30         started        32 schtasks.exe 18->32         started        34 3 other processes 18->34 file5 131 Detected Stratum mining protocol 81->131 signatures6 process7 file8 55 C:\Windows\sysagrsv.exe, PE32 20->55 dropped 99 Antivirus detection for dropped file 20->99 101 Multi AV Scanner detection for dropped file 20->101 103 Found evasive API chain (may stop execution after checking mutex) 20->103 107 5 other signatures 20->107 36 sysagrsv.exe 7 20 20->36         started        105 Query firmware table information (likely to detect VMs) 24->105 41 conhost.exe 28->41         started        signatures9 process10 dnsIp11 75 217.12.85.22, 40500 UZ-BCC-ASISP-AmaliyAloqalarBiznesiLtdTashkentUzbe Uzbekistan 36->75 77 46.100.181.186, 40500 TCIIR Iran (ISLAMIC Republic Of) 36->77 79 46 other IPs or domains 36->79 59 C:\Users\user\AppData\...\2535314771.exe, PE32 36->59 dropped 61 C:\Users\user\AppData\Local\...\154666341.exe, PE32 36->61 dropped 109 Antivirus detection for dropped file 36->109 111 Multi AV Scanner detection for dropped file 36->111 113 Found evasive API chain (may stop execution after checking mutex) 36->113 115 5 other signatures 36->115 43 154666341.exe 36->43         started        46 2535314771.exe 16 36->46         started        file12 signatures13 process14 file15 133 Multi AV Scanner detection for dropped file 43->133 135 Query firmware table information (likely to detect VMs) 43->135 137 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 43->137 145 6 other signatures 43->145 49 dllhost.exe 43->49         started        71 C:\Users\user\AppData\...\1542310226.exe, PE32+ 46->71 dropped 73 C:\Users\user\AppData\Local\...\xmr[1].exe, PE32+ 46->73 dropped 139 Antivirus detection for dropped file 46->139 141 Machine Learning detection for dropped file 46->141 143 Hides that the sample has been downloaded from the Internet (zone.identifier) 46->143 52 1542310226.exe 3 46->52         started        signatures16 process17 file18 85 Tries to harvest and steal browser information (history, passwords, etc) 49->85 57 C:\Users\user\...\winsvrupd.exe, PE32+ 52->57 dropped 87 Antivirus detection for dropped file 52->87 89 Multi AV Scanner detection for dropped file 52->89 signatures19
Threat name:
Win32.Trojan.MintZard
Status:
Malicious
First seen:
2023-02-15 14:59:14 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
20 of 38 (52.63%)
Threat level:
  5/5
Result
Malware family:
phorphiex
Score:
  10/10
Tags:
family:phorphiex evasion loader persistence trojan worm
Behaviour
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
Windows security modification
Downloads MZ/PE file
Phorphiex
Windows security bypass
Malware Config
C2 Extraction:
http://185.215.113.66/
Unpacked files
SH256 hash:
a1650255f850fabb19b9b75865cef9bd45d89a48390f585f3587da14b7484908
MD5 hash:
a86bbe655021fd2f6263011c02a0070d
SHA1 hash:
597fb8aafd9d1d0ab221c6d8291246f43c9ade7e
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Phorpiex

Executable exe a1650255f850fabb19b9b75865cef9bd45d89a48390f585f3587da14b7484908

(this sample)

Comments