Threat Research: PHALT#BLYX: Fake BSODs and Trusted Build Tools
The PHALT#BLYX campaign targets the hospitality sector using sophisticated social engineering and advanced techniques. It begins with a phishing email mimicking a Booking.com reservation cancellation, leading victims to a fake website. Users are tricked into executing malicious PowerShell commands through a fake BSOD and click-fix social engineering tactic. The malware leverages MSBuild.exe to bypass defenses and deploys a customized DCRat payload. It establishes persistence, disables Windows Defender, and uses process hollowing to inject into legitimate processes. The campaign shows evolution from earlier, simpler methods and demonstrates a deep understanding of modern endpoint protection. Attribution points to Russian-speaking threat actors, given the presence of Cyrillic debug strings and the use of DCRat, a popular tool in Russian underground forums.
AI Analysis
Technical Summary
The PHALT#BLYX campaign is a sophisticated malware operation targeting the hospitality sector, leveraging social engineering and advanced technical methods to compromise victims. It begins with phishing emails that mimic Booking.com reservation cancellation notices, a tactic designed to exploit trust and urgency. Victims are lured to fake websites where they are manipulated into executing malicious PowerShell commands through a fake Blue Screen of Death (BSOD) prompt combined with a click-fix social engineering technique. This approach tricks users into believing their system has crashed and that clicking will resolve the issue, thereby executing attacker-controlled code. The malware leverages MSBuild.exe, a legitimate Microsoft build tool, to bypass endpoint defenses by running malicious scripts under the guise of trusted processes. This technique helps evade detection by antivirus and endpoint detection and response (EDR) solutions. The payload deployed is a customized version of DCRat, a remote access trojan popular in Russian-speaking cybercriminal communities. The malware establishes persistence by modifying system settings and disables Windows Defender to avoid removal. It also uses process hollowing, a technique where malicious code is injected into legitimate processes, further complicating detection. The campaign shows evolution from earlier, simpler attacks, indicating the adversaries’ deep understanding of modern security controls and their ability to adapt. Attribution to Russian-speaking actors is supported by the presence of Cyrillic debug strings and the use of DCRat. While no known exploits in the wild have been reported, the campaign’s complexity and targeted nature make it a credible threat. The campaign’s tactics align with MITRE ATT&CK techniques such as T1566.002 (phishing), T1204.002 (user execution), T1059.001 (PowerShell), T1547.001 (registry persistence), T1562.001 (defense evasion via disabling security tools), T1055.012 (process hollowing), and T1095 (proxy or tunneling).
Potential Impact
For European organizations, particularly those in the hospitality sector, the PHALT#BLYX campaign poses significant risks including unauthorized access, data exfiltration, and potential disruption of services. The use of social engineering combined with advanced evasion techniques increases the likelihood of successful compromise. Once inside, attackers can disable critical security tools like Windows Defender, making detection and remediation more difficult. Process hollowing and persistence mechanisms enable long-term access, increasing the risk of data theft, espionage, or ransomware deployment. The hospitality sector is a prime target due to the sensitive personal and payment data it handles, which could lead to regulatory penalties under GDPR if breached. Additionally, disruption of booking and reservation systems could cause operational and reputational damage. The campaign’s sophistication suggests it could be used for espionage or financially motivated attacks, both of which have serious implications for European businesses. The medium severity rating reflects the need for vigilance but also acknowledges that exploitation requires user interaction and targeted phishing, limiting broad impact.
Mitigation Recommendations
European hospitality organizations should implement targeted mitigations beyond generic advice: 1) Conduct regular, sector-specific phishing awareness training emphasizing the risks of fake BSOD and click-fix tactics. 2) Restrict or monitor the use of MSBuild.exe and other trusted build tools via application control policies or endpoint detection rules to detect anomalous usage. 3) Deploy PowerShell logging and enable script block logging to detect suspicious command execution. 4) Harden endpoint defenses by enforcing tamper protection features to prevent disabling of Windows Defender and other security tools. 5) Use behavioral analytics to detect process hollowing and unusual parent-child process relationships. 6) Implement network segmentation to limit lateral movement if a host is compromised. 7) Maintain up-to-date backups and incident response plans tailored to ransomware and RAT infections. 8) Monitor for indicators of compromise related to DCRat and Russian-speaking threat actor TTPs. 9) Employ multi-factor authentication and least privilege principles to reduce impact if credentials are stolen. 10) Collaborate with sector-specific Information Sharing and Analysis Centers (ISACs) to stay informed of emerging threats and indicators.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Belgium, Switzerland, Austria
Indicators of Compromise
- ip: 194.169.163.140
- hash: 55ddf603015e60558debfd07390f4c17
- hash: eaeba8ee3234447dda19fc9f2bf50a65
- hash: 0e477c81be68d8e523783ae46a5502574d481c2d
- hash: 0fd6c9a997a90eb0d8e66984b433600b27cd8d7c
- hash: 07845fcc83f3b490b9f6b80cb8ebde0be46507395d6cbad8bc57857762f7213a
- hash: 11c1cfce546980287e7d3440033191844b5e5e321052d685f4c9ee49937fa688
- hash: 331e76eaef92dd97dcc65d3ad6e3e23a
- hash: 962d2a0880c5325328930b66bb4e2cf1
- hash: b41d64f81945c268377efa5cd6d6e50a
- hash: 62e761ee6ba26325b61b6ea81f1a322546dd35dc
- hash: 6938eb0662e0a8ff9dc359a8382735ad5d494da1
- hash: c19a065d2b5b37f1bf59175d1e497dc165a5ab88
- hash: 08037de4a729634fa818ddf03ddd27c28c89f42158af5ede71cf0ae2d78fa198
- hash: 13b25ae54f3a28f6d01be29bee045e1842b1ebb6fd8d6aca23783791a461d9dd
- hash: 18c75d6f034a1ed389f22883a0007805c7e93af9e43852282aa0c6d5dafaa970
- hash: 1f520651958ae1ec9ee788eefe49b9b143630c340dbecd5e9abf56080d2649de
- hash: 2f3d0c15f1c90c5e004377293eaac02d441eb18b59a944b2f2b6201bb36f0d63
- hash: 33f0672159bb8f89a809b1628a6cc7dddae7037a288785cff32d9a7b24e86f4b
- hash: 6bd31dfd36ce82e588f37a9ad233c022e0a87b132dc01b93ebbab05b57e5defd
- hash: 8d176cc0b442d32482b2489e01a38edc71df80e03db2099193be65fedc9a34a4
- hash: 91696f9b909c479be23440a9e4072dd8c11716f2ad3241607b542b202ab831ce
- hash: 9c891e9dc6fece95b44bb64123f89ddeab7c5efc95bf071fb4457996050f10a0
- hash: 9fac0304cfa56ca5232f61034a796d99b921ba8405166743a5d1b447a7389e4f
- hash: 9fc15d50a3df0ac7fb043e098b890d9201c3bb56a592f168a3a89e7581bc7a7d
- hash: bf374d8e2a37ff28b4dc9338b45bbf396b8bf088449d05f00aba3c39c54a3731
- hash: cd3604fb9fe210261de11921ff1bea0a7bf948ad477d063e17863cede1fadc41
- hash: e68a69c93bf149778c4c05a3acb779999bc6d5bcd3d661bfd6656285f928c18e
- url: http://2fa-bns.com/win/ajsb.exe
- url: https://2fa-bns.com/
- domain: 2fa-bns.com
- domain: 8eh18dhq9wd.click
- domain: asj77.com
- domain: asj88.com
- domain: asj99.com
- domain: low-house.com
- domain: oncameraworkout.com
- domain: wmk77.com
Threat Research: PHALT#BLYX: Fake BSODs and Trusted Build Tools
Description
The PHALT#BLYX campaign targets the hospitality sector using sophisticated social engineering and advanced techniques. It begins with a phishing email mimicking a Booking.com reservation cancellation, leading victims to a fake website. Users are tricked into executing malicious PowerShell commands through a fake BSOD and click-fix social engineering tactic. The malware leverages MSBuild.exe to bypass defenses and deploys a customized DCRat payload. It establishes persistence, disables Windows Defender, and uses process hollowing to inject into legitimate processes. The campaign shows evolution from earlier, simpler methods and demonstrates a deep understanding of modern endpoint protection. Attribution points to Russian-speaking threat actors, given the presence of Cyrillic debug strings and the use of DCRat, a popular tool in Russian underground forums.
AI-Powered Analysis
Technical Analysis
The PHALT#BLYX campaign is a sophisticated malware operation targeting the hospitality sector, leveraging social engineering and advanced technical methods to compromise victims. It begins with phishing emails that mimic Booking.com reservation cancellation notices, a tactic designed to exploit trust and urgency. Victims are lured to fake websites where they are manipulated into executing malicious PowerShell commands through a fake Blue Screen of Death (BSOD) prompt combined with a click-fix social engineering technique. This approach tricks users into believing their system has crashed and that clicking will resolve the issue, thereby executing attacker-controlled code. The malware leverages MSBuild.exe, a legitimate Microsoft build tool, to bypass endpoint defenses by running malicious scripts under the guise of trusted processes. This technique helps evade detection by antivirus and endpoint detection and response (EDR) solutions. The payload deployed is a customized version of DCRat, a remote access trojan popular in Russian-speaking cybercriminal communities. The malware establishes persistence by modifying system settings and disables Windows Defender to avoid removal. It also uses process hollowing, a technique where malicious code is injected into legitimate processes, further complicating detection. The campaign shows evolution from earlier, simpler attacks, indicating the adversaries’ deep understanding of modern security controls and their ability to adapt. Attribution to Russian-speaking actors is supported by the presence of Cyrillic debug strings and the use of DCRat. While no known exploits in the wild have been reported, the campaign’s complexity and targeted nature make it a credible threat. The campaign’s tactics align with MITRE ATT&CK techniques such as T1566.002 (phishing), T1204.002 (user execution), T1059.001 (PowerShell), T1547.001 (registry persistence), T1562.001 (defense evasion via disabling security tools), T1055.012 (process hollowing), and T1095 (proxy or tunneling).
Potential Impact
For European organizations, particularly those in the hospitality sector, the PHALT#BLYX campaign poses significant risks including unauthorized access, data exfiltration, and potential disruption of services. The use of social engineering combined with advanced evasion techniques increases the likelihood of successful compromise. Once inside, attackers can disable critical security tools like Windows Defender, making detection and remediation more difficult. Process hollowing and persistence mechanisms enable long-term access, increasing the risk of data theft, espionage, or ransomware deployment. The hospitality sector is a prime target due to the sensitive personal and payment data it handles, which could lead to regulatory penalties under GDPR if breached. Additionally, disruption of booking and reservation systems could cause operational and reputational damage. The campaign’s sophistication suggests it could be used for espionage or financially motivated attacks, both of which have serious implications for European businesses. The medium severity rating reflects the need for vigilance but also acknowledges that exploitation requires user interaction and targeted phishing, limiting broad impact.
Mitigation Recommendations
European hospitality organizations should implement targeted mitigations beyond generic advice: 1) Conduct regular, sector-specific phishing awareness training emphasizing the risks of fake BSOD and click-fix tactics. 2) Restrict or monitor the use of MSBuild.exe and other trusted build tools via application control policies or endpoint detection rules to detect anomalous usage. 3) Deploy PowerShell logging and enable script block logging to detect suspicious command execution. 4) Harden endpoint defenses by enforcing tamper protection features to prevent disabling of Windows Defender and other security tools. 5) Use behavioral analytics to detect process hollowing and unusual parent-child process relationships. 6) Implement network segmentation to limit lateral movement if a host is compromised. 7) Maintain up-to-date backups and incident response plans tailored to ransomware and RAT infections. 8) Monitor for indicators of compromise related to DCRat and Russian-speaking threat actor TTPs. 9) Employ multi-factor authentication and least privilege principles to reduce impact if credentials are stolen. 10) Collaborate with sector-specific Information Sharing and Analysis Centers (ISACs) to stay informed of emerging threats and indicators.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.securonix.com/blog/analyzing-phaltblyx-how-fake-bsods-and-trusted-build-tools-are-used-to-construct-a-malware-infection"]
- Adversary
- PHALT#BLYX
- Pulse Id
- 6960ce99819838117ecc31a2
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip194.169.163.140 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash55ddf603015e60558debfd07390f4c17 | — | |
hasheaeba8ee3234447dda19fc9f2bf50a65 | — | |
hash0e477c81be68d8e523783ae46a5502574d481c2d | — | |
hash0fd6c9a997a90eb0d8e66984b433600b27cd8d7c | — | |
hash07845fcc83f3b490b9f6b80cb8ebde0be46507395d6cbad8bc57857762f7213a | — | |
hash11c1cfce546980287e7d3440033191844b5e5e321052d685f4c9ee49937fa688 | — | |
hash331e76eaef92dd97dcc65d3ad6e3e23a | — | |
hash962d2a0880c5325328930b66bb4e2cf1 | — | |
hashb41d64f81945c268377efa5cd6d6e50a | — | |
hash62e761ee6ba26325b61b6ea81f1a322546dd35dc | — | |
hash6938eb0662e0a8ff9dc359a8382735ad5d494da1 | — | |
hashc19a065d2b5b37f1bf59175d1e497dc165a5ab88 | — | |
hash08037de4a729634fa818ddf03ddd27c28c89f42158af5ede71cf0ae2d78fa198 | — | |
hash13b25ae54f3a28f6d01be29bee045e1842b1ebb6fd8d6aca23783791a461d9dd | — | |
hash18c75d6f034a1ed389f22883a0007805c7e93af9e43852282aa0c6d5dafaa970 | — | |
hash1f520651958ae1ec9ee788eefe49b9b143630c340dbecd5e9abf56080d2649de | — | |
hash2f3d0c15f1c90c5e004377293eaac02d441eb18b59a944b2f2b6201bb36f0d63 | — | |
hash33f0672159bb8f89a809b1628a6cc7dddae7037a288785cff32d9a7b24e86f4b | — | |
hash6bd31dfd36ce82e588f37a9ad233c022e0a87b132dc01b93ebbab05b57e5defd | — | |
hash8d176cc0b442d32482b2489e01a38edc71df80e03db2099193be65fedc9a34a4 | — | |
hash91696f9b909c479be23440a9e4072dd8c11716f2ad3241607b542b202ab831ce | — | |
hash9c891e9dc6fece95b44bb64123f89ddeab7c5efc95bf071fb4457996050f10a0 | — | |
hash9fac0304cfa56ca5232f61034a796d99b921ba8405166743a5d1b447a7389e4f | — | |
hash9fc15d50a3df0ac7fb043e098b890d9201c3bb56a592f168a3a89e7581bc7a7d | — | |
hashbf374d8e2a37ff28b4dc9338b45bbf396b8bf088449d05f00aba3c39c54a3731 | — | |
hashcd3604fb9fe210261de11921ff1bea0a7bf948ad477d063e17863cede1fadc41 | — | |
hashe68a69c93bf149778c4c05a3acb779999bc6d5bcd3d661bfd6656285f928c18e | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://2fa-bns.com/win/ajsb.exe | — | |
urlhttps://2fa-bns.com/ | — |
Domain
| Value | Description | Copy |
|---|---|---|
domain2fa-bns.com | — | |
domain8eh18dhq9wd.click | — | |
domainasj77.com | — | |
domainasj88.com | — | |
domainasj99.com | — | |
domainlow-house.com | — | |
domainoncameraworkout.com | — | |
domainwmk77.com | — |
Threat ID: 6960d469ecefc3cd7c1d0dcb
Added to database: 1/9/2026, 10:11:53 AM
Last enriched: 1/9/2026, 10:24:35 AM
Last updated: 1/10/2026, 1:09:10 AM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-01-09
MediumCNCERT: Risk Warning Regarding the "Black Cat" Gang's Use of Search Engines to Spread Counterfeit Notepad++ Download Remote Control Backdoors
MediumReborn in Rust: MuddyWater Evolves Tooling with RustyWater Implant
MediumGuloader Malware Being Disguised as Employee Performance Reports
MediumBoto-Cor-de-Rosa campaign reveals Astaroth WhatsApp-based worm activity in Brazil
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.