Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Threat Research: PHALT#BLYX: Fake BSODs and Trusted Build Tools

0
Medium
Published: Fri Jan 09 2026 (01/09/2026, 09:47:05 UTC)
Source: AlienVault OTX General

Description

The PHALT#BLYX campaign targets the hospitality sector using sophisticated social engineering and advanced techniques. It begins with a phishing email mimicking a Booking.com reservation cancellation, leading victims to a fake website. Users are tricked into executing malicious PowerShell commands through a fake BSOD and click-fix social engineering tactic. The malware leverages MSBuild.exe to bypass defenses and deploys a customized DCRat payload. It establishes persistence, disables Windows Defender, and uses process hollowing to inject into legitimate processes. The campaign shows evolution from earlier, simpler methods and demonstrates a deep understanding of modern endpoint protection. Attribution points to Russian-speaking threat actors, given the presence of Cyrillic debug strings and the use of DCRat, a popular tool in Russian underground forums.

AI-Powered Analysis

AILast updated: 01/09/2026, 10:24:35 UTC

Technical Analysis

The PHALT#BLYX campaign is a sophisticated malware operation targeting the hospitality sector, leveraging social engineering and advanced technical methods to compromise victims. It begins with phishing emails that mimic Booking.com reservation cancellation notices, a tactic designed to exploit trust and urgency. Victims are lured to fake websites where they are manipulated into executing malicious PowerShell commands through a fake Blue Screen of Death (BSOD) prompt combined with a click-fix social engineering technique. This approach tricks users into believing their system has crashed and that clicking will resolve the issue, thereby executing attacker-controlled code. The malware leverages MSBuild.exe, a legitimate Microsoft build tool, to bypass endpoint defenses by running malicious scripts under the guise of trusted processes. This technique helps evade detection by antivirus and endpoint detection and response (EDR) solutions. The payload deployed is a customized version of DCRat, a remote access trojan popular in Russian-speaking cybercriminal communities. The malware establishes persistence by modifying system settings and disables Windows Defender to avoid removal. It also uses process hollowing, a technique where malicious code is injected into legitimate processes, further complicating detection. The campaign shows evolution from earlier, simpler attacks, indicating the adversaries’ deep understanding of modern security controls and their ability to adapt. Attribution to Russian-speaking actors is supported by the presence of Cyrillic debug strings and the use of DCRat. While no known exploits in the wild have been reported, the campaign’s complexity and targeted nature make it a credible threat. The campaign’s tactics align with MITRE ATT&CK techniques such as T1566.002 (phishing), T1204.002 (user execution), T1059.001 (PowerShell), T1547.001 (registry persistence), T1562.001 (defense evasion via disabling security tools), T1055.012 (process hollowing), and T1095 (proxy or tunneling).

Potential Impact

For European organizations, particularly those in the hospitality sector, the PHALT#BLYX campaign poses significant risks including unauthorized access, data exfiltration, and potential disruption of services. The use of social engineering combined with advanced evasion techniques increases the likelihood of successful compromise. Once inside, attackers can disable critical security tools like Windows Defender, making detection and remediation more difficult. Process hollowing and persistence mechanisms enable long-term access, increasing the risk of data theft, espionage, or ransomware deployment. The hospitality sector is a prime target due to the sensitive personal and payment data it handles, which could lead to regulatory penalties under GDPR if breached. Additionally, disruption of booking and reservation systems could cause operational and reputational damage. The campaign’s sophistication suggests it could be used for espionage or financially motivated attacks, both of which have serious implications for European businesses. The medium severity rating reflects the need for vigilance but also acknowledges that exploitation requires user interaction and targeted phishing, limiting broad impact.

Mitigation Recommendations

European hospitality organizations should implement targeted mitigations beyond generic advice: 1) Conduct regular, sector-specific phishing awareness training emphasizing the risks of fake BSOD and click-fix tactics. 2) Restrict or monitor the use of MSBuild.exe and other trusted build tools via application control policies or endpoint detection rules to detect anomalous usage. 3) Deploy PowerShell logging and enable script block logging to detect suspicious command execution. 4) Harden endpoint defenses by enforcing tamper protection features to prevent disabling of Windows Defender and other security tools. 5) Use behavioral analytics to detect process hollowing and unusual parent-child process relationships. 6) Implement network segmentation to limit lateral movement if a host is compromised. 7) Maintain up-to-date backups and incident response plans tailored to ransomware and RAT infections. 8) Monitor for indicators of compromise related to DCRat and Russian-speaking threat actor TTPs. 9) Employ multi-factor authentication and least privilege principles to reduce impact if credentials are stolen. 10) Collaborate with sector-specific Information Sharing and Analysis Centers (ISACs) to stay informed of emerging threats and indicators.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.securonix.com/blog/analyzing-phaltblyx-how-fake-bsods-and-trusted-build-tools-are-used-to-construct-a-malware-infection"]
Adversary
PHALT#BLYX
Pulse Id
6960ce99819838117ecc31a2
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip194.169.163.140

Hash

ValueDescriptionCopy
hash55ddf603015e60558debfd07390f4c17
hasheaeba8ee3234447dda19fc9f2bf50a65
hash0e477c81be68d8e523783ae46a5502574d481c2d
hash0fd6c9a997a90eb0d8e66984b433600b27cd8d7c
hash07845fcc83f3b490b9f6b80cb8ebde0be46507395d6cbad8bc57857762f7213a
hash11c1cfce546980287e7d3440033191844b5e5e321052d685f4c9ee49937fa688
hash331e76eaef92dd97dcc65d3ad6e3e23a
hash962d2a0880c5325328930b66bb4e2cf1
hashb41d64f81945c268377efa5cd6d6e50a
hash62e761ee6ba26325b61b6ea81f1a322546dd35dc
hash6938eb0662e0a8ff9dc359a8382735ad5d494da1
hashc19a065d2b5b37f1bf59175d1e497dc165a5ab88
hash08037de4a729634fa818ddf03ddd27c28c89f42158af5ede71cf0ae2d78fa198
hash13b25ae54f3a28f6d01be29bee045e1842b1ebb6fd8d6aca23783791a461d9dd
hash18c75d6f034a1ed389f22883a0007805c7e93af9e43852282aa0c6d5dafaa970
hash1f520651958ae1ec9ee788eefe49b9b143630c340dbecd5e9abf56080d2649de
hash2f3d0c15f1c90c5e004377293eaac02d441eb18b59a944b2f2b6201bb36f0d63
hash33f0672159bb8f89a809b1628a6cc7dddae7037a288785cff32d9a7b24e86f4b
hash6bd31dfd36ce82e588f37a9ad233c022e0a87b132dc01b93ebbab05b57e5defd
hash8d176cc0b442d32482b2489e01a38edc71df80e03db2099193be65fedc9a34a4
hash91696f9b909c479be23440a9e4072dd8c11716f2ad3241607b542b202ab831ce
hash9c891e9dc6fece95b44bb64123f89ddeab7c5efc95bf071fb4457996050f10a0
hash9fac0304cfa56ca5232f61034a796d99b921ba8405166743a5d1b447a7389e4f
hash9fc15d50a3df0ac7fb043e098b890d9201c3bb56a592f168a3a89e7581bc7a7d
hashbf374d8e2a37ff28b4dc9338b45bbf396b8bf088449d05f00aba3c39c54a3731
hashcd3604fb9fe210261de11921ff1bea0a7bf948ad477d063e17863cede1fadc41
hashe68a69c93bf149778c4c05a3acb779999bc6d5bcd3d661bfd6656285f928c18e

Url

ValueDescriptionCopy
urlhttp://2fa-bns.com/win/ajsb.exe
urlhttps://2fa-bns.com/

Domain

ValueDescriptionCopy
domain2fa-bns.com
domain8eh18dhq9wd.click
domainasj77.com
domainasj88.com
domainasj99.com
domainlow-house.com
domainoncameraworkout.com
domainwmk77.com

Threat ID: 6960d469ecefc3cd7c1d0dcb

Added to database: 1/9/2026, 10:11:53 AM

Last enriched: 1/9/2026, 10:24:35 AM

Last updated: 1/10/2026, 1:09:10 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats