Rewterz
Rewterz Threat Alert –CrySIS aka Dharma Ransomware – Active IOCs
January 22, 2024
Rewterz
Rewterz Threat Alert –FormBook Malware – Active IOCs
January 22, 2024

Rewterz Threat Alert –Phobos Ransomware – Active IOCs

Severity

High

Analysis Summary

Phobos Ransomware is based on the Dharma (aka CrySIS) malware that first appeared at the beginning of 2019. It spreads into several systems via compromised Remote Desktop Protocol (RDP) connections. This malware does not use any UAC bypass methods. Unlike other cybercrime gangs that go after big hunts, Phobos creators go after smaller firms that don’t have sufficient funding to pay massive ransoms. This ransomware usually targets healthcare providers, with victims in the United States, Seychelles, Portugal, Brazil, Indonesia, Germany, Romania, and Japan. Its perpetrators demand a little ransom payment, which appeals to victims and enhances the chances of payment. The average Phobos ransom payment in July 2022 was $36,932

Phobos encrypts data & files and keeps them locked until a ransom is paid. All encrypted files are renamed with the “.phobos” extension, as well as the victim’s unique ID and email address.

ransom note

Impact

  • File Encryption
  • Data Exfiltration

Indicators of Compromise

MD5

  • 43328da08f588f4741ea82cf572e1466
  • 00fa7f88c54e4a7abf4863734a8f2017
  • dc2d809e46c60ee990844ee7fbdc17cd

SHA-256

  • 9fc90e8a523848d646508deccde2518ffba0b79a85da2b3eb6d04eadc05543a7
  • 0a5be1c9541e0fadce5f1928d3bb95367baef9ce59d487688662b100e88aabf5
  • 41dbdaeb1dc8fe40358a5e168af596da85c6a84796e63c9d10c11f2077129eaf

SHA-1

  • 054f696225d613ada29c592af7f54eb2c55d5e5c
  • c56bbdcfe813dea15de3bce7441982eb12e2c2db
  • 839ce9c0e3cab37d4de0b25460d9b0dc047bb2ae

Remediation

  • Block all threat indicators at your respective controls.
  • Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls.
  • Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
  • Maintain Offline Backups – In a ransomware attack, the adversary will often delete or encrypt backups if they have access to them. That’s why it’s important to keep offline (preferably off-site), encrypted backups of data and test them regularly.
  • Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.