BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
50
Global rank
28
Month rank
38 infographic chevron week
Week rank
229
IOCs

Phobos is a ransomware that locks or encrypts files to demand a ransom. It uses AES encryption with different extensions, which leaves no chance to recover the infected files.

Ransomware
Type
Unknown
Origin
1 October, 2017
First seen
14 May, 2024
Last seen

How to analyze Phobos with ANY.RUN

Type
Unknown
Origin
1 October, 2017
First seen
14 May, 2024
Last seen

IOCs

IP addresses
45.138.48.20
185.202.0.111
45.9.74.14
147.78.47.224
Hashes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wlaexfpxrs.org
Last Seen at

Recent blog posts

post image
A Guide to ANY.RUN’s YARA Search 
watchers 44
comments 0
post image
Celebrate ANY.RUN’s 8th Birthday with Special...
watchers 100
comments 0
post image
How to Use Threat Intelligence Feeds
watchers 490
comments 0

What is Phobos Ransomware?

Phobos Ransomware encrypts data until a ransom is paid. 77% of Phobos attacks are successful according to the latest research. This malicious program was recorded in the wild for the first time in October 2017.

General description of Phobos Ransomware

Phobos ransomware appeared in 2017 in Dharma, also known as the CrySIS, family. A year later Phobos developed and spread rapidly. In 2019, it accounted for 8.9% of the submitted ransomware attacks. The First-quarter of 2020 showed that the Phobos strain was noted as one of the most common ransomware with 9.70% of submissions. It constantly gets updates and new versions.

The ransomware targets organizations all over the world. Phobos compromises RDP servers that are open or have weak security. Then cyber criminals send ransom notes, where the victim is asked to contact one of the emails to get the decryption key.

Phobos attackers exactly like Dharma ones can discuss ransom amounts depending on the company. The Ransom amount can reach 20,000 USD in Bitcoin. It is lower than usual ransomware demands because Phobos chooses small companies as victims. And sometimes cybercriminals don’t give up the decryption key even after the payment.

The malicious program uses encrypt data using AES and adds extensions to infected files such as .phobos, .phoenix, .actin, .help, .mamba and others. These files can be fully or partially encrypted.

Phobos is named after the Greek god of fear, but there is nothing divine about it. Criminals buy this malware in RaaS packages, so even without deep technical knowledge, they have an opportunity to design their own strain and organize an attack on the chosen victim.

Phobos malware analysis

The ANY.RUN malware hunting service features a video that displays the complete execution process of Phobos.

phobos ransomware process graph

Figure 1: Shows the graph of processes created by the ANY.RUN interactive malware analysis service

phobos ransom note

Figure 2: Phobos ransom note

Phobos Ransomware execution process

The execution process of the Phobos ransomware is relatively typical for this type of malware such as Troldesh. The executable file makes its way into an infected system and runs, then the main malicious activity begins. After the start of execution, the Ransomware deletes shadow copies. Interestingly though, as soon as it encrypts all targeted files, Phobos pops up a ransom note on the desktop, which is the ransomware executable file itself.

Phobos Ransomware distribution

Phobos has several ways to end up on your machine:

  • phishing emails with attachments
  • poorly secured RDP ports
  • fake updates
  • exploits
  • deceptive downloads
  • web injectors
  • repacked and infected installers

These distribution methods help attackers to steal victims’ information and encrypt the data by running Trojan or other malware. And a variety of the infected files is huge: documents, PDF and text files, databases, photos and videos, archives, etc. They can be located both in internal and external folders. Phobos gets rid of files’ shadow copies and backups.

Conclusion

Phobos is not a new type of ransomware, moreover, it has some similarities to Dharma. There is no need for criminals who use Phobos to be qualified specialists. Nevertheless, this ransomware always evolves, and its attacks are effective. It has a lot of ways to get into your device to get a ransom. That is why Phobos can be a serious threat to organizations.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy