Research
Researchransomware5 min read

When ransomware borrows a trusted name

Phobos ransomware dressed itself up as Vx-Underground - ransom notes, file extensions and all. Here's what the impersonation looked like under the hood.

L
Lewis
When ransomware borrows a trusted name

Phobos is one of those ransomware families that does significant damage without ever becoming a household name. It accounted for roughly 4% of all submissions to the ID Ransomware identification service in 2023, but it doesn't carry the notoriety of LockBit or REvil. That gap says less about the malware itself and more about the economics of Ransomware-as-a-Service - platforms that have made launching a ransomware campaign about as technically demanding as setting up a Shopify store.

This particular variant caught my attention because of who it was pretending to be. Vx-Underground is a well-known malware research collective that maintains one of the largest publicly available malware repositories. The Phobos operators borrowed their name, their branding and their contact details to dress up the ransom notes. It's an odd choice for impersonation - a bit like a burglar leaving a calling card with a locksmith's name on it.

What landed on the host

The sample was analysed in a cloud sandbox environment to replicate what a SOC analyst would see during triage. The file arrived as a 48KB zip archive and executed from the user's temp directory.

PropertyValue
FamilyPhobos
MD55f3689f795c7111c259d76bd19c509d3
SHA-25635c01c9613c4f96a634ecebac702bdef8e1e194b96c3fc2d0b1bd997c2d8c98c
File size48KB

Once running, the ransomware immediately set about dismantling the host's safety nets. It used netsh.exe to disable Windows Firewall, then turned to vssadmin.exe and WMIC.exe to delete all Volume Shadow Copies - the backup mechanism most users never think about until it's gone. Boot recovery was suppressed using bcdedit.exe, which altered the configuration to ignore failures and prevent automatic repair.

That sequence is methodical. Disable the firewall, destroy the backups, lock out recovery. By the time the encryption starts, the victim's options have already been removed.

The impersonation

The Vx-Underground branding was woven through the entire attack chain. Multiple .hta files - HTML applications rendered by mshta.exe - were placed across the host, each displaying a ransom note that referenced Vx-Underground's official support email and Twitter handle alongside a unique victim ID.

Vx-Underground HTA ransom note displayed via mshta.exe

The encrypted files themselves were given a .VXUG extension, reinforcing the false attribution. The ransom note offered to decrypt five files for free - a common tactic to prove the attackers hold the decryption key and nudge the victim towards payment.

Encrypted documents with .VXUG extension

The best detail sits in the accompanying text file. The ransomware dropped a note titled "Buy Black Mass Volume I.txt" - Black Mass being the name of Vx-Underground's own research and malware compendium. The note helpfully informed victims that the decryption password is not "infected", which is the password Vx-Underground uses across their entire malware repository. Whether this was a joke, a taunt or a genuine attempt at misdirection is hard to say, but it's one of the more self-aware touches I've seen in a ransomware campaign.

Buy Black Mass Volume I ransom note

No phone home

One of the more operationally interesting findings was the complete absence of network traffic. The sample made no attempt to contact a command and control server. No DNS lookups, no HTTP callbacks, no exfiltration channels. It arrived, encrypted and waited.

That characteristic makes Phobos harder to detect through network monitoring and more dangerous in isolated environments. If your detection strategy relies heavily on spotting suspicious outbound connections, this variant slips through cleanly.

The API calls worth noting

Two Windows API functions stood out during analysis, both repurposed from their intended use:

AdjustTokenPrivilege manages permissions in a process token. Here it was used to escalate the ransomware's process privileges, granting it the access level needed to modify system configurations and encrypt protected files.

SetWindowsHookEx installs hook procedures to monitor system events - keystrokes, mouse input, window messages. Its presence suggests the malware had spyware capabilities alongside the encryption payload, potentially capturing user input before or during the attack.

ATT&CK mapping

The variant maps cleanly across several MITRE ATT&CK techniques:

  • Execution - User execution via phishing attachment (T1204.002)
  • Persistence - System process creation and registry modification for startup persistence (T1543.003, T1547.001)
  • Privilege escalation - Token manipulation to run with elevated privileges (T1543.003, T1547.001)
  • Defence evasion - Shadow copy deletion, registry modification and audit log clearing (T1070.004, T1112)
  • Credential access - Targeting stored browser data and insecurely stored credentials (T1555.001, T1005)
  • Discovery - Host fingerprinting including OS and hardware enumeration (T1082)
  • Impact - File encryption across local and remote drives with backup destruction (T1486, T1490)

Indicators of compromise

The following IoCs have been defanged to prevent accidental execution.

Files and commands

FileCommandPIDs
AppData\Local\Temp\763b...dbdeb.exe1276, 2128
system32\cmd.exe628, 2376, 1640
system32\vssadmin.exevssadmin delete shadows /all /quiet2660, 1488
System32\Wbem\WMIC.exewmic shadowcopy delete2328, 1616
system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures2592, 472, 2180, 328
system32\netsh.exenetsh advfirewall set currentprofile state off2720, 2964
SysWOW64\mshta.exeRendered .hta ransom notes2972, 692, 3004, 2968

Contact and network indicators

  • staff@vx-underground[.]org (impersonated)
  • hxxps://bazaar[.]abuse[.]ch/browse/
  • hxxps://malshare[.]com/

Phobos sits in a strange space. It's capable enough to do real damage, quiet enough to avoid the spotlight and brazen enough to wear someone else's name while doing it. The Vx-Underground impersonation adds a layer of dark comedy to an otherwise routine encryption-and-extortion playbook - but the underlying mechanics are sound, the defence evasion is thorough and the offline capability makes it a genuine headache for environments that rely on network-based detection.

The operators behind this variant understood the tools at their disposal. They just had an unusual sense of humour about attribution.

Newsletter

One email a week. Security research, engineering deep-dives and AI security insights - written for practitioners. No noise.