Trojan.Phorpiex.L
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 4,075 |
| Threat Level: | 80 % (High) |
| Infected Computers: | 3,227 |
| First Seen: | September 22, 2021 |
| Last Seen: | April 9, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Phorpiex.L |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
8e24635a9f130c1423e55a63d6b93f7f
SHA1:
9780f6bd1fbe1f3ec6b2d9c5cecc05d077a202b2
SHA256:
201CAABEAC38A9257CBC25DF6DCAA3C8035005C094741B1BEC434FDA2F4552DC
File Size:
83.97 KB, 83968 bytes
|
|
MD5:
24e61055d182cae7183cb72f6649584a
SHA1:
a7e36d9639fe4c571cfe9ca6fbe3b048bd2eda1a
SHA256:
805DB6F001167B526485CFB9BD6FAC5DBE7737AF6A46100CC69348C9145BEE4A
File Size:
96.26 KB, 96256 bytes
|
|
MD5:
94cd39133211cfd7efc6a3322f06ca11
SHA1:
714cca1da752fe6549b53aaef547c744c99d0e3b
SHA256:
7436220538E6CDED0C499167424975A2AACF93217DCA40C683F0610B4F3EB3B7
File Size:
93.18 KB, 93184 bytes
|
|
MD5:
6ff808f90c532747835e5346945412f6
SHA1:
3ac48c857e66380ec16f636ac969aba1be5dbb6e
SHA256:
51455BCE4F49061E859CB4CC830F9D4B3478F9C7082B7B9F55FEBC68234A06F7
File Size:
81.92 KB, 81920 bytes
|
|
MD5:
f4c9005c80304cf865ebaad861d18bfe
SHA1:
48edac0f38ebf625a559bbd8771cf824777099c8
SHA256:
6B7C767694AA1CDF7429F364C0C104B32F738203C8C60B5F25A6E2F6A66A71FA
File Size:
81.41 KB, 81408 bytes
|
Show More
|
MD5:
869e6edba1580088394b324cd41e7dbd
SHA1:
b384ea034c9a9cfc1bc355b460f31733b18f0b21
SHA256:
2E893562114E5FAFA195FB09E0DB323F4C41F6A327196F98FCCDFEB18E887E6C
File Size:
88.58 KB, 88576 bytes
|
|
MD5:
6199855251d7b05edb4cf99c25712c84
SHA1:
1b4ec13ad40cb581428c31911285ce77340716a2
SHA256:
5EE7C0FB726D43C3FEC9C254A88240D9A032B2451EF39ACB28A7F5AEC36D86C9
File Size:
83.97 KB, 83968 bytes
|
|
MD5:
72f721cdb43e7b703638ec58bfce542c
SHA1:
d118d46189226685c684f4d60c838a33877fb1e8
SHA256:
AC161C60E82AD3D095D1248B6A961185018715F6FBB7CEEB52D934A40D3F7BE2
File Size:
53.25 KB, 53248 bytes
|
|
MD5:
087be025580edb09a6c65b2bd4a8ee93
SHA1:
02610d7b7e746c7e3c19b0a1e72afc85fed66627
SHA256:
98E5FDCE85AB8E17472F95EECB4C22F08A28933828E0AFD0B5DB831FE222E373
File Size:
93.70 KB, 93696 bytes
|
|
MD5:
f9e0e2c00a3dfcb1d755ede1ef73ed23
SHA1:
777f563cfc86e85cba15632536101bb7ed6d26cc
SHA256:
70CBEB8511C84E704514D463B99D290139583B924B465837A49F94D9D5D2FB4A
File Size:
244.87 KB, 244865 bytes
|
|
MD5:
4d2d3b04cf612c15cf5815be0fbeac51
SHA1:
532bcca73750df10fc476e07a22c74f42d616f7f
SHA256:
AD9CD916566C52D3045FEA0120900A9F2F460A4BFBC01D0BAC236F3CC9344739
File Size:
84.48 KB, 84480 bytes
|
|
MD5:
4737c6899345a8f5cd555c7366f88526
SHA1:
0bf08b7c682880563739f5cef31124fa6146250d
SHA256:
0104E0B13130DFA08E3B021B85ED80399CE15AFBCBCF00D672750B3FE5465795
File Size:
53.25 KB, 53248 bytes
|
|
MD5:
f8753e60f6f2eb70088fa7182656d3ac
SHA1:
e315798256458400adcae939d48a71ac23cbc286
SHA256:
4B025FE6F45E606628DF3987E6AEFCDC19220C9DD9711BE20DBDBFCE23C4D742
File Size:
54.78 KB, 54784 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have resources
- File doesn't have security information
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
Show More
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| File Version | 1.00 |
| Internal Name | TJprojMain |
| Original Filename | TJprojMain.exe |
| Product Name | Project1 |
| Product Version | 1.00 |
File Traits
- No Version Info
- ntdll
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 33 |
|---|---|
| Potentially Malicious Blocks: | 12 |
| Whitelisted Blocks: | 19 |
| Unknown Blocks: | 2 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Phorpiex.EAA
- Phorpiex.L
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| Synchronize,Write Attributes | |
| c:\users\user\appdata\local\temp\112845758.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\1624921087.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\1862138977.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\2259933105.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\2284714136.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\2735630740.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\2979131115.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\3119117785.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\3121534183.exe | Generic Write,Read Attributes |
Show More
| c:\users\user\appdata\local\temp\326752202.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\3560138068.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\3913033601.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\437024002.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\56644882.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\94812546.exe | Generic Write,Read Attributes |
| c:\windows\syscfgvhost.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\windows\syscfgvhost.exe | Synchronize,Write Attributes |
| c:\windows\syscnrhost.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\windows\syscnrhost.exe | Synchronize,Write Attributes |
| c:\windows\syscrovhost.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\windows\syscrovhost.exe | Synchronize,Write Attributes |
| c:\windows\syscvnrhost.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\windows\syscvnrhost.exe | Synchronize,Write Attributes |
| c:\windows\sysdrvhost.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\windows\sysdrvhost.exe | Synchronize,Write Attributes |
| c:\windows\sysdvrnshost.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\windows\sysdvrnshost.exe | Synchronize,Write Attributes |
| c:\windows\syskturdnv.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\windows\syskturdnv.exe | Synchronize,Write Attributes |
| c:\windows\sysmdrhost.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\windows\sysmdrhost.exe | Synchronize,Write Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\software\wow6432node\microsoft\windows\currentversion\run::windows settings | C:\WINDOWS\syskturdnv.exe | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\content::cacheprefix | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\cookies::cacheprefix | Cookie: | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\history::cacheprefix | Visited: | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\windows\currentversion\run::windows settings | C:\WINDOWS\syscnrhost.exe | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\windows\currentversion\run::windows settings | C:\WINDOWS\sysdrvhost.exe | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\windows\currentversion\run::windows settings | C:\WINDOWS\syscfgvhost.exe | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\windows\currentversion\run::windows settings | C:\WINDOWS\syscrovhost.exe | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\windows\currentversion\run::windows settings | C:\WINDOWS\sysmdrhost.exe | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\windows\currentversion\run::windows settings | C:\WINDOWS\sysdvrnshost.exe | RegNtPreCreateKey |
Show More
| HKLM\software\wow6432node\microsoft\windows\currentversion\run::windows settings | C:\WINDOWS\syscvnrhost.exe | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Network Winsock2 |
|
| Network Winsock |
|
| Anti Debug |
|
| Network Wininet |
|
| Network Urlomon |
|
| User Data Access |
|
| Other Suspicious |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
C:\WINDOWS\syskturdnv.exe
|
C:\WINDOWS\syscnrhost.exe
|
C:\WINDOWS\sysdrvhost.exe
|
C:\WINDOWS\syscfgvhost.exe
|
C:\WINDOWS\syscrovhost.exe
|
Show More
C:\WINDOWS\sysmdrhost.exe
|
C:\WINDOWS\sysdvrnshost.exe
|
C:\WINDOWS\syscvnrhost.exe
|