General

  • Target

    6529259d321cd833140bc2cf29e1c5cf46064ea1a968fb440ee46fb939b7c02a

  • Size

    4.7MB

  • Sample

    201106-xgd1wpcyzj

  • MD5

    12d654c5509109fff4fc031b1236b0b2

  • SHA1

    a93f8ee55b794d66f2631101dc5ce65b39d4dd7a

  • SHA256

    6529259d321cd833140bc2cf29e1c5cf46064ea1a968fb440ee46fb939b7c02a

  • SHA512

    93cd5f08710ff5ab52713e53ae446af5e2b4bd2a1a6d0f3d7e006849daeea683811cd02334c63906a1c2ad64cc17874a51d8f4988c36b50f104bccc6acb240d9

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1

Targets

    • Target

      6529259d321cd833140bc2cf29e1c5cf46064ea1a968fb440ee46fb939b7c02a

    • Size

      4.7MB

    • MD5

      12d654c5509109fff4fc031b1236b0b2

    • SHA1

      a93f8ee55b794d66f2631101dc5ce65b39d4dd7a

    • SHA256

      6529259d321cd833140bc2cf29e1c5cf46064ea1a968fb440ee46fb939b7c02a

    • SHA512

      93cd5f08710ff5ab52713e53ae446af5e2b4bd2a1a6d0f3d7e006849daeea683811cd02334c63906a1c2ad64cc17874a51d8f4988c36b50f104bccc6acb240d9

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blacklisted process makes network request

    • Modifies RDP port number used by Windows

    • Possible privilege escalation attempt

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

    • Modifies service

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Account Manipulation

1
T1098

Registry Run Keys / Startup Folder

1
T1060

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

3
T1112

File Permissions Modification

1
T1222

Lateral Movement

Remote Desktop Protocol

1
T1076

Tasks