Skip to content

simbazad/Phobos_Analysis

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Phobos Analysis

Phobos Ransomware Analysis

Password for phobos_sample.zip --> "infected"

Update :

Apparently this phobos variant searches for C:\k.txt to extract its TEA key so it can decrypt its full payload.

img

img (closer look)

Take a look at the breakpoint in the above img, if the content of k.txt isn't right the CMP instruction will compare the 4 bytes in SS:[EBP-8] with the 4-byte integer constant 10. this memory adress contains:

img

so on the JNZ instruction we will jump and get TerminateProcess, lets patch it and continue.

img

img

img

As you can see the malware scrumble the file before deleting it so recovering k.txt is probably impossible.

#If someone holds both the malware and the key please share it!

About

Phobos Ransomware Analysis

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published