MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 abf63fc54948cdd9d1bf46a2f59fcb081bb0ff10b595f0ba2faad392ad368922. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Phorpiex


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments 1

SHA256 hash: abf63fc54948cdd9d1bf46a2f59fcb081bb0ff10b595f0ba2faad392ad368922
SHA3-384 hash: 6dacb2216f753f93342ad995dd25bd877cda5cee3f768c5a8578686eee7387b614ea68993adc1c8446f7efffcb292738
SHA1 hash: 2fd868d94c6dc063ca49c767c873505fbc87dcd9
MD5 hash: ee0a1ec859b753abc30847157d81f37c
humanhash: potato-cat-cup-white
File name:t.exe
Download: download sample
Signature Phorpiex
File size:102'912 bytes
First seen:2021-05-06 04:42:02 UTC
Last seen:2021-05-06 05:00:49 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 23ab644c44593e426ea915e5618d637d (2 x Phorpiex)
ssdeep 3072:UlmICQuNwVOv/8I6WruEPJZDUXA2M1CUci6sUJW51TrFS83Fo:WmICRmgMtWruEhZDCA2M1CUci6sUJW5D
Threatray 1 similar samples on MalwareBazaar
TLSH 4EA32922E551C53AF46600B7DBFA69FB5A28AD31130430C3F3D46DDA6A658E1BD3026F
Reporter starsSk87264403
Tags:exe Phorpiex

Intelligence


File Origin
# of uploads :
2
# of downloads :
106
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
1694521508.bin
Verdict:
Malicious activity
Analysis date:
2021-05-06 00:41:48 UTC
Tags:
evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a service
Using the Windows Management Instrumentation requests
Searching for the window
Creating a window
Creating a file
Sending a UDP request
Moving a recently created file
Replacing files
Deleting a recently created file
DHCP request
Sending an HTTP GET request
Sending a custom TCP request
Unauthorized injection to a recently created process
DNS request
Searching for many windows
Enabling the 'hidden' option for recently created files
Creating a process from a recently created file
Connecting to a non-recommended domain
Creating a file in the Windows subdirectories
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Blocking the Windows Security Center notifications
Creating a file in the mass storage device
Enabling threat expansion on mass storage devices by creating a special LNK file
Sending an HTTP GET request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.expl.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Detected Stratum mining protocol
Drops PE files with benign system names
Found strings related to Crypto-Mining
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: System File Execution Location Anomaly
Sigma detected: WScript or CScript Dropper
System process connects to network (likely due to code injection or exploit)
Tries to detect the country of the analysis system (by using the IP)
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 405453 Sample: t.exe Startdate: 06/05/2021 Architecture: WINDOWS Score: 100 90 Multi AV Scanner detection for domain / URL 2->90 92 Malicious sample detected (through community Yara rule) 2->92 94 Antivirus detection for URL or domain 2->94 96 15 other signatures 2->96 10 t.exe 2 16 2->10         started        15 svchost.exe 9 1 2->15         started        17 lsass.exe 13 2->17         started        19 13 other processes 2->19 process3 dnsIp4 82 api.wipmania.com 212.83.168.196, 49714, 49724, 49728 OnlineSASFR France 10->82 64 C:\140372370827215\lsass.exe, PE32 10->64 dropped 116 May check the online IP address of the machine 10->116 118 Drops PE files with benign system names 10->118 120 Hides that the sample has been downloaded from the Internet (zone.identifier) 10->120 21 lsass.exe 7 29 10->21         started        84 xmrupdtemall.top 127.0.0.1 unknown unknown 15->84 86 192.168.2.1 unknown unknown 19->86 26 MpCmdRun.exe 19->26         started        file5 signatures6 process7 dnsIp8 74 vitamind.top 185.215.113.93, 49729, 49730, 49735 WHOLESALECONNECTIONSNL Portugal 21->74 76 gotsomefile.top 21->76 78 13 other IPs or domains 21->78 54 C:\Users\user\AppData\...\3838211046.exe, data 21->54 dropped 56 C:\Users\user\AppData\...\3551839747.exe, data 21->56 dropped 58 C:\Users\user\AppData\...\2490338465.exe, data 21->58 dropped 98 Antivirus detection for dropped file 21->98 100 Multi AV Scanner detection for dropped file 21->100 102 May check the online IP address of the machine 21->102 106 3 other signatures 21->106 28 3838211046.exe 21->28         started        32 2490338465.exe 13 21->32         started        35 3551839747.exe 13 21->35         started        37 conhost.exe 26->37         started        file9 104 Detected Stratum mining protocol 74->104 signatures10 process11 dnsIp12 66 C:\Users\user\AppData\...\1225338770.exe, PE32 28->66 dropped 68 C:\Users\user\AppData\Local\...\xmr[1].exe, PE32 28->68 dropped 122 Hides that the sample has been downloaded from the Internet (zone.identifier) 28->122 39 1225338770.exe 28->39         started        70 api.wipmania.com 32->70 124 May check the online IP address of the machine 32->124 72 api.wipmania.com 35->72 file13 signatures14 process15 dnsIp16 80 xmrupdtemall.top 39->80 60 C:\ProgramData\CjtqpVHEcA\winmanager, PE32 39->60 dropped 62 C:\ProgramData\CjtqpVHEcA\r.vbs, data 39->62 dropped 108 Antivirus detection for dropped file 39->108 110 Multi AV Scanner detection for dropped file 39->110 112 Machine Learning detection for dropped file 39->112 114 4 other signatures 39->114 44 notepad.exe 39->44         started        48 cmd.exe 39->48         started        file17 signatures18 process19 dnsIp20 88 vitamind.top 44->88 126 System process connects to network (likely due to code injection or exploit) 44->126 50 conhost.exe 48->50         started        52 wscript.exe 48->52         started        signatures21 process22
Threat name:
Win32.Infostealer.ClipBanker
Status:
Malicious
First seen:
2021-05-03 07:08:13 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
phorphiex
Score:
  10/10
Tags:
family:phorphiex evasion loader persistence trojan worm
Behaviour
Suspicious use of WriteProcessMemory
Adds Run key to start application
Loads dropped DLL
Windows security modification
Executes dropped EXE
Phorphiex Payload
Phorphiex Worm
Windows security bypass
Unpacked files
SH256 hash:
abf63fc54948cdd9d1bf46a2f59fcb081bb0ff10b595f0ba2faad392ad368922
MD5 hash:
ee0a1ec859b753abc30847157d81f37c
SHA1 hash:
2fd868d94c6dc063ca49c767c873505fbc87dcd9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:phorp_New_2021_B
Author:@is_henderson
Description:Detecting recent phorpiex variant

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Phorpiex

Executable exe abf63fc54948cdd9d1bf46a2f59fcb081bb0ff10b595f0ba2faad392ad368922

(this sample)

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-06 05:00:44 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0012.001] Anti-Static Analysis::Argument Obfuscation
1) [B0030.002] Command and Control::Receive Data
2) [B0030.001] Command and Control::Send Data
3) [C0011.001] Communication Micro-objective::Resolve::DNS Communication
4) [C0002.012] Communication Micro-objective::Create Request::HTTP Communication
5) [C0002.006] Communication Micro-objective::Download URL::HTTP Communication
6) [C0002.017] Communication Micro-objective::Get Response::HTTP Communication
7) [C0002.004] Communication Micro-objective::Open URL::HTTP Communication
8) [C0002.014] Communication Micro-objective::Read Header::HTTP Communication
9) [C0001.011] Communication Micro-objective::Create TCP Socket::Socket Communication
10) [C0001.009] Communication Micro-objective::Initialize Winsock Library::Socket Communication
11) [C0001.006] Communication Micro-objective::Receive Data::Socket Communication
12) [C0001.007] Communication Micro-objective::Send Data::Socket Communication
13) [C0001.001] Communication Micro-objective::Set Socket Config::Socket Communication
14) [C0029.002] Cryptography Micro-objective::SHA1::Cryptographic Hash
15) [C0029] Cryptography Micro-objective::Cryptographic Hash
16) [C0031] Cryptography Micro-objective::Decrypt Data
17) [C0027.001] Cryptography Micro-objective::AES::Encrypt Data
18) [C0027.009] Cryptography Micro-objective::RC4::Encrypt Data
19) [C0027] Cryptography Micro-objective::Encrypt Data
20) [C0021.003] Cryptography Micro-objective::Use API::Generate Pseudo-random Sequence
22) [C0045] File System Micro-objective::Copy File
23) [C0046] File System Micro-objective::Create Directory
24) [C0048] File System Micro-objective::Delete Directory
25) [C0047] File System Micro-objective::Delete File
26) [C0050] File System Micro-objective::Set File Attributes
27) [C0052] File System Micro-objective::Writes File
28) [E1510] Impact::Clipboard Modification
29) [C0036.004] Operating System Micro-objective::Create Registry Key::Registry
30) [C0036.003] Operating System Micro-objective::Open Registry Key::Registry
31) [C0036.006] Operating System Micro-objective::Query Registry Value::Registry
32) [C0036.001] Operating System Micro-objective::Set Registry Key::Registry
33) [C0043] Process Micro-objective::Check Mutex
34) [C0042] Process Micro-objective::Create Mutex
35) [C0017] Process Micro-objective::Create Process
36) [C0038] Process Micro-objective::Create Thread
37) [C0018] Process Micro-objective::Terminate Process
38) [C0039] Process Micro-objective::Terminate Thread