MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e664364dc7cc75f56ddeca9e946b10ccc54d068a7767e5822134913006f39b1c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Phorpiex


Vendor detections: 16


Intelligence 16 IOCs YARA 3 File information Comments

SHA256 hash: e664364dc7cc75f56ddeca9e946b10ccc54d068a7767e5822134913006f39b1c
SHA3-384 hash: 602b20fb37ae598b3216d1bf3cc8b1dfed9ae7c2467f7870f57c06993325a470a47777a0c30455ef6394a2f2bffe188e
SHA1 hash: 0629d26e09f45aea2a3c06580a82dbc9f94fe386
MD5 hash: 52776f7c163b7eb61219abd5b5af3973
humanhash: king-shade-kitten-single
File name:e664364dc7cc75f56ddeca9e946b10ccc54d068a7767e5822134913006f39b1c
Download: download sample
Signature Phorpiex
File size:465'496 bytes
First seen:2023-02-06 12:45:41 UTC
Last seen:2023-02-06 14:48:24 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash dcbe94b8cc54b8e53867c61cc96811d6 (1 x Phorpiex, 1 x LummaStealer, 1 x ACRStealer)
ssdeep 12288:uymOcB+pwPprnVmLmDsC+FU+ZOSzt9tzt:uLOsDFncLmKDZOSzXFt
Threatray 64 similar samples on MalwareBazaar
TLSH T169A46D32A7A05033D6F105B3F914D6307E7DA2296F1089ABD3949D2D3EA84D6A7F7213
TrID 74.9% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
4.0% (.EXE) Win64 Executable (generic) (10523/12/4)
2.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.9% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon b2e1b496a6cada72 (13 x LummaStealer, 12 x AsyncRAT, 8 x Rhadamanthys)
Reporter adrian__luca
Tags:exe Phorpiex

Intelligence


File Origin
# of uploads :
2
# of downloads :
199
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
phorpiex
ID:
1
File name:
e085c86990a0c1bd74cc290eaef3144f.exe
Verdict:
Malicious activity
Analysis date:
2023-01-22 17:35:40 UTC
Tags:
loader trojan phorpiex

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
Сreating synchronization primitives
Creating a file in the Windows directory
Enabling the 'hidden' option for recently created files
Sending a custom TCP request
DNS request
Sending a UDP request
Creating a file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Blocking the Windows Security Center notifications
Creating a file in the mass storage device
Sending an HTTP GET request to an infection source
Enabling threat expansion on mass storage devices
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionQueryPerformanceCounter
EvasionGetTickCount
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware overlay packed shell32.dll virus zusy
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Phorpiex, Xmrig
Detection:
malicious
Classification:
troj.evad.mine
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to check if Internet connection is working
Contains functionality to detect sleep reduction / modifications
Detected Stratum mining protocol
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after checking mutex)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found hidden mapped module (file has been removed from disk)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Snort IDS alert for network traffic
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Phorpiex
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 799386 Sample: VzZdPuMkMm.exe Startdate: 06/02/2023 Architecture: WINDOWS Score: 100 93 Snort IDS alert for network traffic 2->93 95 Antivirus detection for URL or domain 2->95 97 Antivirus detection for dropped file 2->97 99 9 other signatures 2->99 10 VzZdPuMkMm.exe 18 2->10         started        15 winsvrupd.exe 2->15         started        17 powershell.exe 35 2->17         started        19 11 other processes 2->19 process3 dnsIp4 85 185.215.113.66, 49709, 49710, 49716 WHOLESALECONNECTIONSNL Portugal 10->85 71 C:\Users\user\AppData\Local\Temp\4F1B.exe, PE32 10->71 dropped 73 C:\Users\user\AppData\Local\...\npp[1].exe, PE32 10->73 dropped 127 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 10->127 129 Hides that the sample has been downloaded from the Internet (zone.identifier) 10->129 21 4F1B.exe 18 10->21         started        75 C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+ 15->75 dropped 77 C:\Users\user\AppData\Local\...\mpnsrsgv.tmp, PE32+ 15->77 dropped 131 Writes to foreign memory regions 15->131 133 Modifies the context of a thread in another process (thread injection) 15->133 135 Maps a DLL or memory area into another process 15->135 137 Sample is not signed and drops a device driver 15->137 26 cmd.exe 15->26         started        139 Uses schtasks.exe or at.exe to add and modify task schedules 17->139 28 conhost.exe 17->28         started        141 Query firmware table information (likely to detect VMs) 19->141 30 MpCmdRun.exe 19->30         started        32 conhost.exe 19->32         started        34 schtasks.exe 19->34         started        36 3 other processes 19->36 file5 signatures6 process7 dnsIp8 83 185.215.113.84, 49713, 49720, 49739 WHOLESALECONNECTIONSNL Portugal 21->83 63 C:\Users\user\AppData\...\1534818282.exe, PE32 21->63 dropped 65 C:\Users\user\AppData\Local\...\newtpp[1].exe, PE32 21->65 dropped 107 Antivirus detection for dropped file 21->107 109 Machine Learning detection for dropped file 21->109 111 Hides that the sample has been downloaded from the Internet (zone.identifier) 21->111 38 1534818282.exe 1 1 21->38         started        113 Query firmware table information (likely to detect VMs) 26->113 42 conhost.exe 30->42         started        file9 115 Detected Stratum mining protocol 83->115 signatures10 process11 file12 67 C:\Windows\sysagrsv.exe, PE32 38->67 dropped 117 Antivirus detection for dropped file 38->117 119 Multi AV Scanner detection for dropped file 38->119 121 Found evasive API chain (may stop execution after checking mutex) 38->121 123 5 other signatures 38->123 44 sysagrsv.exe 7 20 38->44         started        signatures13 process14 dnsIp15 87 31.186.54.5, 40500 AKNET-ASKG Kyrgyzstan 44->87 89 100.70.71.70, 40500 UUNETUS Reserved 44->89 91 25 other IPs or domains 44->91 79 C:\Users\user\AppData\...\3163610126.exe, PE32 44->79 dropped 81 C:\Users\user\AppData\...\2761716769.exe, PE32 44->81 dropped 143 Antivirus detection for dropped file 44->143 145 Found evasive API chain (may stop execution after checking mutex) 44->145 147 Contains functionality to check if Internet connection is working 44->147 149 4 other signatures 44->149 49 2761716769.exe 15 44->49         started        53 3163610126.exe 44->53         started        file16 signatures17 process18 file19 59 C:\Users\user\AppData\...\2412021078.exe, PE32+ 49->59 dropped 61 C:\Users\user\AppData\Local\...\xmr[1].exe, PE32+ 49->61 dropped 101 Antivirus detection for dropped file 49->101 103 Machine Learning detection for dropped file 49->103 105 Hides that the sample has been downloaded from the Internet (zone.identifier) 49->105 55 2412021078.exe 3 49->55         started        signatures20 process21 file22 69 C:\Users\user\...\winsvrupd.exe, PE32+ 55->69 dropped 125 Antivirus detection for dropped file 55->125 signatures23
Threat name:
Win32.Trojan.Phonzy
Status:
Malicious
First seen:
2023-01-25 15:30:23 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
22 of 39 (56.41%)
Threat level:
  5/5
Result
Malware family:
phorphiex
Score:
  10/10
Tags:
family:phorphiex evasion loader persistence trojan worm
Behaviour
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
Windows security modification
Downloads MZ/PE file
Phorphiex
Windows security bypass
Malware Config
C2 Extraction:
http://185.215.113.66/
Unpacked files
SH256 hash:
e664364dc7cc75f56ddeca9e946b10ccc54d068a7767e5822134913006f39b1c
MD5 hash:
52776f7c163b7eb61219abd5b5af3973
SHA1 hash:
0629d26e09f45aea2a3c06580a82dbc9f94fe386
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments