Remcos RAT – Active IOCs
September 18, 2024Bitter APT – Active IOCs
September 18, 2024Remcos RAT – Active IOCs
September 18, 2024Bitter APT – Active IOCs
September 18, 2024Severity
High
Analysis Summary
Phorpiex is a long-running botnet malware that has plagued users for years. First appearing in 2016, it quickly established itself as a major threat, amassing over a million infected devices at its peak. Phorpiex is a versatile tool for cybercriminals, with capabilities ranging from stealing data to launching ransomware attacks.
One of Phorpiex's most notorious tactics is cryptojacking. By infecting devices, it can harness their processing power to mine cryptocurrency for the attackers. Phorpiex can also steal clipboard data, such as cryptocurrency wallet addresses the user has copied. This allows attackers to swap the user's address with theirs, essentially stealing any cryptocurrency the victim tries to transfer.
Phorpiex is also adept at spreading spam and delivering other malware. Phishing campaigns are a common method of distribution, with malicious emails tricking users into downloading infected attachments or clicking on harmful links. Once a device is compromised, Phorpiex can download additional malware including ransomware that encrypts the files and demands a ransom for decryption.
Phorpiex remains a significant threat as its versatility, ability to self-propagate, and use of evolving techniques make it a challenge for cybersecurity professionals. Staying vigilant against phishing attempts, keeping software updated, and employing robust security solutions are crucial steps in protecting yourself from Phorpiex and other malware threats.
Impact
- Sensitive Data Theft
- Cryptocurrency Theft
- File Encryption
Indicators of Compromise
MD5
- ababca6d12d96e8dd2f1d7114b406fae
- 1e8a2ed2e3f35620fb6b8c2a782a57f3
- ce554fe53b2620c56f6abb264a588616
- aa63b9c3f01d3d50c77b06c75dd63f88
- be9388b42333b3d4e163b0ace699897b
- 1382c0a4a9e0a9a2c942458652a4a0e4
- 5381689d4c9a0ce9d0f67dd8485188d2
SHA-256
- a992920e64a64763f3dd8c2a431a0f5e56e5b3782a1496de92bc80ee71cca5ba
- 3f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879
- 93237a51bb710bd488b0e5bfa8288751445eafcc795364df7652535f3c210431
- dcc51ea4252198d176b3249339675d2ea54759d1fb9aab487bc69f56f7ba2ac1
- d281e0a0f1e1073f2d290a7eb1f77bed4c210dbf83a0f4f4e22073f50faa843f
- 4cb590dfafb7653379326e840d9b904a3cf05451999c4f9eb66c6e7116b68875
- 3860e4bc7a35d52b4193b256bd76e62d98e9d05e504e4871a56585ea56295228
SHA1
- dcd9798e83ec688aacb3de8911492a232cb41a32
- e924ce6d147ecc8b30b7c7cad02e5c9ae09a743a
- 77bbdcd30e7e931ef95c913406faf92fa70d4c94
- e67b74385a1d67ec57f5bb3a40184ee23b251eb4
- 4e1109772eb9cb59c557380822166fe1664403bd
- 55ed8ebd6281c280c3e77763773d789a6057e743
- 28a5df66c1b6cc6b1181a3344edf7df0bb6fa246
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution. Never trust or open links and attachments received from unknown sources/senders.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.