MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 feb4c3ae4566f0acbb9e0f55417b61fefd89dc50a4e684df780813fb01d61278. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Phorpiex


Vendor detections: 17


Intelligence 17 IOCs YARA 2 File information Comments

SHA256 hash: feb4c3ae4566f0acbb9e0f55417b61fefd89dc50a4e684df780813fb01d61278
SHA3-384 hash: 7acbb3e4f8804116f917523e171340bf403074f281d38b1385c88a594d6dde264bd48802eff7732808ea6c0bccdfc77f
SHA1 hash: 9098da03b33b2c822065b49d5220359c275d5e94
MD5 hash: 8d8e6c7952a9dc7c0c73911c4dbc5518
humanhash: hamper-ten-triple-charlie
File name:SecuriteInfo.com.Trojan.DownLoader46.63386.25844.4041
Download: download sample
Signature Phorpiex
File size:9'728 bytes
First seen:2024-07-15 17:29:13 UTC
Last seen:2024-10-26 05:23:35 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7fda7734b056db13fe95f35927509e47 (3 x Phorpiex, 1 x CoinMiner)
ssdeep 96:zMn7AN23D0TXraYgnY1dTNDiIp+BYA8vrcVO15uJxGE9YUBz2qh3C7tCEkC:A7ANUYhUYPtp+OFMJxTmUBzthckC
Threatray 60 similar samples on MalwareBazaar
TLSH T18A12F80ABDCA40A1E3A04CF056B5878A8EBD90631786B2DBB7B3C9594F5139084677F5
TrID 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
12.7% (.EXE) Win64 Executable (generic) (10523/12/4)
7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter SecuriteInfoCom
Tags:exe Phorpiex

Intelligence


File Origin
# of uploads :
3
# of downloads :
425
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
phorpiex
ID:
1
File name:
Setup.exe
Verdict:
Malicious activity
Analysis date:
2024-07-12 13:41:03 UTC
Tags:
phorpiex loader opendir lumma stealer stealc raccoon rat asyncrat remote zphp dcrat smokeloader evasion github exela python adware

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Сreating synchronization primitives
Creating a file in the Windows directory
Enabling the 'hidden' option for recently created files
Creating a window
Query of malicious DNS domain
Connection attempt to an infection source
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Disabling the operating system update service
Blocking the Windows Security Center notifications
Creating a file in the mass storage device
Sending an HTTP GET request to an infection source
Enabling a "Do not show hidden files" option
Enabling threat expansion on mass storage devices
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
crypto epmicrosoft_visual_cc fingerprint lolbin masquerade microsoft_visual_cc phorpiex shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Phorpiex, Xmrig
Detection:
malicious
Classification:
troj.evad.mine
Score:
100 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Changes the view of files in windows explorer (hidden files and folders)
Contains functionality to check if Internet connection is working
Contains functionality to detect sleep reduction / modifications
Creates HTML files with .exe extension (expired dropper behavior)
Detected Stratum mining protocol
Drops executables to the windows directory (C:\Windows) and starts them
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after checking mutex)
Found hidden mapped module (file has been removed from disk)
Found strings related to Crypto-Mining
Hides that the sample has been downloaded from the Internet (zone.identifier)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Notepad Making Network Connection
Snort IDS alert for network traffic
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Writes to foreign memory regions
Yara detected Phorpiex
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1473747 Sample: SecuriteInfo.com.Trojan.Dow... Startdate: 15/07/2024 Architecture: WINDOWS Score: 100 73 twizt.net 2->73 93 Snort IDS alert for network traffic 2->93 95 Malicious sample detected (through community Yara rule) 2->95 97 Antivirus detection for URL or domain 2->97 99 15 other signatures 2->99 10 SecuriteInfo.com.Trojan.DownLoader46.63386.25844.4041.exe 16 2->10         started        15 wupgrdsv.exe 4 2->15         started        17 powershell.exe 37 2->17         started        19 3 other processes 2->19 signatures3 process4 dnsIp5 77 twizt.net 185.215.113.66, 49704, 49705, 49708 WHOLESALECONNECTIONSNL Portugal 10->77 63 C:\Users\user\AppData\...\1283412477.exe, PE32 10->63 dropped 65 C:\Users\user\AppData\Local\...\newtpp[1].exe, PE32 10->65 dropped 127 Hides that the sample has been downloaded from the Internet (zone.identifier) 10->127 21 1283412477.exe 1 1 10->21         started        67 C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+ 15->67 dropped 69 C:\Users\user\AppData\...\tvaifjwjgvdx.tmp, PE32+ 15->69 dropped 129 Suspicious powershell command line found 15->129 131 Found strings related to Crypto-Mining 15->131 133 Writes to foreign memory regions 15->133 139 4 other signatures 15->139 25 notepad.exe 15->25         started        135 Loading BitLocker PowerShell Module 17->135 27 conhost.exe 17->27         started        29 conhost.exe 19->29         started        file6 137 Detected Stratum mining protocol 77->137 signatures7 process8 file9 57 C:\Windows\sysmablsvr.exe, PE32 21->57 dropped 101 Antivirus detection for dropped file 21->101 103 Multi AV Scanner detection for dropped file 21->103 105 Contains functionality to check if Internet connection is working 21->105 111 3 other signatures 21->111 31 sysmablsvr.exe 8 45 21->31         started        107 System process connects to network (likely due to code injection or exploit) 25->107 109 Query firmware table information (likely to detect VMs) 25->109 signatures10 process11 dnsIp12 79 189.134.7.239, 40500 UninetSAdeCVMX Mexico 31->79 81 100.65.94.79, 40500 UUNETUS Reserved 31->81 83 81 other IPs or domains 31->83 49 C:\Users\user\AppData\Local\...\591716032.exe, PE32 31->49 dropped 51 C:\Users\user\AppData\...\1883625428.exe, PE32 31->51 dropped 53 C:\Users\user\AppData\...\1668827846.exe, PE32 31->53 dropped 55 7 other malicious files 31->55 dropped 85 Antivirus detection for dropped file 31->85 87 Multi AV Scanner detection for dropped file 31->87 89 Found evasive API chain (may stop execution after checking mutex) 31->89 91 8 other signatures 31->91 36 1668827846.exe 15 31->36         started        41 591716032.exe 31->41         started        43 1883625428.exe 1 31->43         started        file13 signatures14 process15 dnsIp16 75 185.215.113.84, 49717, 80 WHOLESALECONNECTIONSNL Portugal 36->75 59 C:\Users\user\AppData\...\1336412557.exe, PE32+ 36->59 dropped 61 C:\Users\user\AppData\Local\...\nxmr[1].exe, PE32+ 36->61 dropped 113 Multi AV Scanner detection for dropped file 36->113 115 Machine Learning detection for dropped file 36->115 117 Hides that the sample has been downloaded from the Internet (zone.identifier) 36->117 45 1336412557.exe 2 36->45         started        119 Antivirus detection for dropped file 41->119 121 Found evasive API chain (may stop execution after checking mutex) 41->121 123 Contains functionality to check if Internet connection is working 41->123 125 Contains functionality to detect sleep reduction / modifications 41->125 file17 signatures18 process19 file20 71 C:\Users\user\Windows Upgrade\wupgrdsv.exe, PE32+ 45->71 dropped 141 Antivirus detection for dropped file 45->141 143 Multi AV Scanner detection for dropped file 45->143 145 Suspicious powershell command line found 45->145 147 2 other signatures 45->147 signatures21
Threat name:
Win32.Worm.Phorpiex
Status:
Malicious
First seen:
2024-05-15 15:06:14 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
phorphiex
Score:
  10/10
Tags:
family:phorphiex evasion loader persistence trojan worm
Behaviour
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
Windows security modification
Downloads MZ/PE file
Modifies security service
Phorphiex payload
Phorphiex, Phorpiex
Windows security bypass
Malware Config
C2 Extraction:
http://185.215.113.66/
http://77.91.77.92/
http://91.202.233.141/
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
feb4c3ae4566f0acbb9e0f55417b61fefd89dc50a4e684df780813fb01d61278
MD5 hash:
8d8e6c7952a9dc7c0c73911c4dbc5518
SHA1 hash:
9098da03b33b2c822065b49d5220359c275d5e94
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Phorpiex

Executable exe feb4c3ae4566f0acbb9e0f55417b61fefd89dc50a4e684df780813fb01d61278

(this sample)

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
URL_MONIKERS_APICan Download & Execute componentsurlmon.dll::URLDownloadToFileW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
WININET.dll::InternetCloseHandle
KERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::GetStartupInfoA
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW

Comments