General
-
Target
6529259d321cd833140bc2cf29e1c5cf46064ea1a968fb440ee46fb939b7c02a
-
Size
4.7MB
-
Sample
201106-xgd1wpcyzj
-
MD5
12d654c5509109fff4fc031b1236b0b2
-
SHA1
a93f8ee55b794d66f2631101dc5ce65b39d4dd7a
-
SHA256
6529259d321cd833140bc2cf29e1c5cf46064ea1a968fb440ee46fb939b7c02a
-
SHA512
93cd5f08710ff5ab52713e53ae446af5e2b4bd2a1a6d0f3d7e006849daeea683811cd02334c63906a1c2ad64cc17874a51d8f4988c36b50f104bccc6acb240d9
Static task
static1
Behavioral task
behavioral1
Sample
6529259d321cd833140bc2cf29e1c5cf46064ea1a968fb440ee46fb939b7c02a.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
6529259d321cd833140bc2cf29e1c5cf46064ea1a968fb440ee46fb939b7c02a.exe
Resource
win10v20201028
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
6529259d321cd833140bc2cf29e1c5cf46064ea1a968fb440ee46fb939b7c02a
-
Size
4.7MB
-
MD5
12d654c5509109fff4fc031b1236b0b2
-
SHA1
a93f8ee55b794d66f2631101dc5ce65b39d4dd7a
-
SHA256
6529259d321cd833140bc2cf29e1c5cf46064ea1a968fb440ee46fb939b7c02a
-
SHA512
93cd5f08710ff5ab52713e53ae446af5e2b4bd2a1a6d0f3d7e006849daeea683811cd02334c63906a1c2ad64cc17874a51d8f4988c36b50f104bccc6acb240d9
Score10/10-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blacklisted process makes network request
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies file permissions
-
Drops file in System32 directory
-
Modifies service
-