Threat Database Trojans Trojan.Phorpiex.L

Trojan.Phorpiex.L

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 4,075
Threat Level: 80 % (High)
Infected Computers: 3,227
First Seen: September 22, 2021
Last Seen: April 9, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Phorpiex.L
Signature status: No Signature

Known Samples

MD5: 8e24635a9f130c1423e55a63d6b93f7f
SHA1: 9780f6bd1fbe1f3ec6b2d9c5cecc05d077a202b2
SHA256: 201CAABEAC38A9257CBC25DF6DCAA3C8035005C094741B1BEC434FDA2F4552DC
File Size: 83.97 KB, 83968 bytes
MD5: 24e61055d182cae7183cb72f6649584a
SHA1: a7e36d9639fe4c571cfe9ca6fbe3b048bd2eda1a
SHA256: 805DB6F001167B526485CFB9BD6FAC5DBE7737AF6A46100CC69348C9145BEE4A
File Size: 96.26 KB, 96256 bytes
MD5: 94cd39133211cfd7efc6a3322f06ca11
SHA1: 714cca1da752fe6549b53aaef547c744c99d0e3b
SHA256: 7436220538E6CDED0C499167424975A2AACF93217DCA40C683F0610B4F3EB3B7
File Size: 93.18 KB, 93184 bytes
MD5: 6ff808f90c532747835e5346945412f6
SHA1: 3ac48c857e66380ec16f636ac969aba1be5dbb6e
SHA256: 51455BCE4F49061E859CB4CC830F9D4B3478F9C7082B7B9F55FEBC68234A06F7
File Size: 81.92 KB, 81920 bytes
MD5: f4c9005c80304cf865ebaad861d18bfe
SHA1: 48edac0f38ebf625a559bbd8771cf824777099c8
SHA256: 6B7C767694AA1CDF7429F364C0C104B32F738203C8C60B5F25A6E2F6A66A71FA
File Size: 81.41 KB, 81408 bytes
Show More
MD5: 869e6edba1580088394b324cd41e7dbd
SHA1: b384ea034c9a9cfc1bc355b460f31733b18f0b21
SHA256: 2E893562114E5FAFA195FB09E0DB323F4C41F6A327196F98FCCDFEB18E887E6C
File Size: 88.58 KB, 88576 bytes
MD5: 6199855251d7b05edb4cf99c25712c84
SHA1: 1b4ec13ad40cb581428c31911285ce77340716a2
SHA256: 5EE7C0FB726D43C3FEC9C254A88240D9A032B2451EF39ACB28A7F5AEC36D86C9
File Size: 83.97 KB, 83968 bytes
MD5: 72f721cdb43e7b703638ec58bfce542c
SHA1: d118d46189226685c684f4d60c838a33877fb1e8
SHA256: AC161C60E82AD3D095D1248B6A961185018715F6FBB7CEEB52D934A40D3F7BE2
File Size: 53.25 KB, 53248 bytes
MD5: 087be025580edb09a6c65b2bd4a8ee93
SHA1: 02610d7b7e746c7e3c19b0a1e72afc85fed66627
SHA256: 98E5FDCE85AB8E17472F95EECB4C22F08A28933828E0AFD0B5DB831FE222E373
File Size: 93.70 KB, 93696 bytes
MD5: f9e0e2c00a3dfcb1d755ede1ef73ed23
SHA1: 777f563cfc86e85cba15632536101bb7ed6d26cc
SHA256: 70CBEB8511C84E704514D463B99D290139583B924B465837A49F94D9D5D2FB4A
File Size: 244.87 KB, 244865 bytes
MD5: 4d2d3b04cf612c15cf5815be0fbeac51
SHA1: 532bcca73750df10fc476e07a22c74f42d616f7f
SHA256: AD9CD916566C52D3045FEA0120900A9F2F460A4BFBC01D0BAC236F3CC9344739
File Size: 84.48 KB, 84480 bytes
MD5: 4737c6899345a8f5cd555c7366f88526
SHA1: 0bf08b7c682880563739f5cef31124fa6146250d
SHA256: 0104E0B13130DFA08E3B021B85ED80399CE15AFBCBCF00D672750B3FE5465795
File Size: 53.25 KB, 53248 bytes
MD5: f8753e60f6f2eb70088fa7182656d3ac
SHA1: e315798256458400adcae939d48a71ac23cbc286
SHA256: 4B025FE6F45E606628DF3987E6AEFCDC19220C9DD9711BE20DBDBFCE23C4D742
File Size: 54.78 KB, 54784 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have resources
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
File Version 1.00
Internal Name TJprojMain
Original Filename TJprojMain.exe
Product Name Project1
Product Version 1.00

File Traits

  • No Version Info
  • ntdll
  • x86

Block Information

Total Blocks: 33
Potentially Malicious Blocks: 12
Whitelisted Blocks: 19
Unknown Blocks: 2

Visual Map

x x x x x x x x 0 ? 0 x x x x ? 2 0 0 1 0 0 1 1 0 0 2 2 2 3 1 0 1
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Phorpiex.EAA
  • Phorpiex.L

Files Modified

File Attributes
Synchronize,Write Attributes
c:\users\user\appdata\local\temp\112845758.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\1624921087.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\1862138977.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\2259933105.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\2284714136.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\2735630740.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\2979131115.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\3119117785.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\3121534183.exe Generic Write,Read Attributes
Show More
c:\users\user\appdata\local\temp\326752202.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\3560138068.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\3913033601.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\437024002.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\56644882.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\94812546.exe Generic Write,Read Attributes
c:\windows\syscfgvhost.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\windows\syscfgvhost.exe Synchronize,Write Attributes
c:\windows\syscnrhost.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\windows\syscnrhost.exe Synchronize,Write Attributes
c:\windows\syscrovhost.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\windows\syscrovhost.exe Synchronize,Write Attributes
c:\windows\syscvnrhost.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\windows\syscvnrhost.exe Synchronize,Write Attributes
c:\windows\sysdrvhost.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\windows\sysdrvhost.exe Synchronize,Write Attributes
c:\windows\sysdvrnshost.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\windows\sysdvrnshost.exe Synchronize,Write Attributes
c:\windows\syskturdnv.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\windows\syskturdnv.exe Synchronize,Write Attributes
c:\windows\sysmdrhost.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\windows\sysmdrhost.exe Synchronize,Write Attributes

Registry Modifications

Key::Value Data API Name
HKLM\software\wow6432node\microsoft\windows\currentversion\run::windows settings C:\WINDOWS\syskturdnv.exe RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\content::cacheprefix RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\cookies::cacheprefix Cookie: RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\history::cacheprefix Visited: RegNtPreCreateKey
HKLM\software\wow6432node\microsoft\windows\currentversion\run::windows settings C:\WINDOWS\syscnrhost.exe RegNtPreCreateKey
HKLM\software\wow6432node\microsoft\windows\currentversion\run::windows settings C:\WINDOWS\sysdrvhost.exe RegNtPreCreateKey
HKLM\software\wow6432node\microsoft\windows\currentversion\run::windows settings C:\WINDOWS\syscfgvhost.exe RegNtPreCreateKey
HKLM\software\wow6432node\microsoft\windows\currentversion\run::windows settings C:\WINDOWS\syscrovhost.exe RegNtPreCreateKey
HKLM\software\wow6432node\microsoft\windows\currentversion\run::windows settings C:\WINDOWS\sysmdrhost.exe RegNtPreCreateKey
HKLM\software\wow6432node\microsoft\windows\currentversion\run::windows settings C:\WINDOWS\sysdvrnshost.exe RegNtPreCreateKey
Show More
HKLM\software\wow6432node\microsoft\windows\currentversion\run::windows settings C:\WINDOWS\syscvnrhost.exe RegNtPreCreateKey

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Network Winsock2
  • WSAStartup
Network Winsock
  • bind
  • closesocket
  • connect
  • gethostbyname
  • getsockname
  • inet_addr
  • recvfrom
  • sendto
  • setsockopt
  • socket
Anti Debug
  • NtQuerySystemInformation
Network Wininet
  • HttpQueryInfo
  • InternetOpen
  • InternetOpenUrl
  • InternetReadFile
Network Urlomon
  • URLDownloadToFile
User Data Access
  • OpenClipboard
Other Suspicious
  • SetWindowsHookEx

Shell Command Execution

C:\WINDOWS\syskturdnv.exe
C:\WINDOWS\syscnrhost.exe
C:\WINDOWS\sysdrvhost.exe
C:\WINDOWS\syscfgvhost.exe
C:\WINDOWS\syscrovhost.exe
Show More
C:\WINDOWS\sysmdrhost.exe
C:\WINDOWS\sysdvrnshost.exe
C:\WINDOWS\syscvnrhost.exe

Trending

Most Viewed

Loading...