Threat Research: PHALT#BLYX: Fake BSODs and Trusted Build Tools
Jan. 9, 2026, 10:36 a.m.
Description
The PHALT#BLYX campaign targets the hospitality sector using sophisticated social engineering and advanced techniques. It begins with a phishing email mimicking a Booking.com reservation cancellation, leading victims to a fake website. Users are tricked into executing malicious PowerShell commands through a fake BSOD and click-fix social engineering tactic. The malware leverages MSBuild.exe to bypass defenses and deploys a customized DCRat payload. It establishes persistence, disables Windows Defender, and uses process hollowing to inject into legitimate processes. The campaign shows evolution from earlier, simpler methods and demonstrates a deep understanding of modern endpoint protection. Attribution points to Russian-speaking threat actors, given the presence of Cyrillic debug strings and the use of DCRat, a popular tool in Russian underground forums.
Tags
Date
- Created: Jan. 9, 2026, 9:47 a.m.
- Published: Jan. 9, 2026, 9:47 a.m.
- Modified: Jan. 9, 2026, 10:36 a.m.
Indicators
- 13b25ae54f3a28f6d01be29bee045e1842b1ebb6fd8d6aca23783791a461d9dd
- 2f3d0c15f1c90c5e004377293eaac02d441eb18b59a944b2f2b6201bb36f0d63
- 1f520651958ae1ec9ee788eefe49b9b143630c340dbecd5e9abf56080d2649de
- 07845fcc83f3b490b9f6b80cb8ebde0be46507395d6cbad8bc57857762f7213a
- 9c891e9dc6fece95b44bb64123f89ddeab7c5efc95bf071fb4457996050f10a0
- 08037de4a729634fa818ddf03ddd27c28c89f42158af5ede71cf0ae2d78fa198
- 33f0672159bb8f89a809b1628a6cc7dddae7037a288785cff32d9a7b24e86f4b
- cd3604fb9fe210261de11921ff1bea0a7bf948ad477d063e17863cede1fadc41
- e68a69c93bf149778c4c05a3acb779999bc6d5bcd3d661bfd6656285f928c18e
- 18c75d6f034a1ed389f22883a0007805c7e93af9e43852282aa0c6d5dafaa970
- 9fc15d50a3df0ac7fb043e098b890d9201c3bb56a592f168a3a89e7581bc7a7d
- bf374d8e2a37ff28b4dc9338b45bbf396b8bf088449d05f00aba3c39c54a3731
- 9fac0304cfa56ca5232f61034a796d99b921ba8405166743a5d1b447a7389e4f
- 91696f9b909c479be23440a9e4072dd8c11716f2ad3241607b542b202ab831ce
- 11c1cfce546980287e7d3440033191844b5e5e321052d685f4c9ee49937fa688
- 6bd31dfd36ce82e588f37a9ad233c022e0a87b132dc01b93ebbab05b57e5defd
- 8d176cc0b442d32482b2489e01a38edc71df80e03db2099193be65fedc9a34a4
- 194.169.163.140
- https://2fa-bns.com/
- http://2fa-bns.com/win/ajsb.exe
Additional Informations
- Hospitality
- oncameraworkout.com
- wmk77.com
- asj88.com
- low-house.com
- 8eh18dhq9wd.click
- 2fa-bns.com
- asj77.com
- asj99.com