General

  • Target

    5cab7684d39cf15db3b9314c14a16e5df6eeaebe69b953c18b87e0c65330e00b

  • Size

    3.5MB

  • Sample

    201108-4b9b3xk8px

  • MD5

    7e806fd5ef516e10a4e4a5362fbc600b

  • SHA1

    edb1b43d7578f170f259958663ace80a01718dc8

  • SHA256

    5cab7684d39cf15db3b9314c14a16e5df6eeaebe69b953c18b87e0c65330e00b

  • SHA512

    30544680de5f5af999cbbba6d632acb4319c370bf526b23cde5e8f40172b97d885608e5a9b086d1cd2df6ee97cc5bb51bb9bf74a742d5866dcca2c58b6c2dbd8

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1

Targets

    • Target

      5cab7684d39cf15db3b9314c14a16e5df6eeaebe69b953c18b87e0c65330e00b

    • Size

      3.5MB

    • MD5

      7e806fd5ef516e10a4e4a5362fbc600b

    • SHA1

      edb1b43d7578f170f259958663ace80a01718dc8

    • SHA256

      5cab7684d39cf15db3b9314c14a16e5df6eeaebe69b953c18b87e0c65330e00b

    • SHA512

      30544680de5f5af999cbbba6d632acb4319c370bf526b23cde5e8f40172b97d885608e5a9b086d1cd2df6ee97cc5bb51bb9bf74a742d5866dcca2c58b6c2dbd8

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blacklisted process makes network request

    • Modifies RDP port number used by Windows

    • Possible privilege escalation attempt

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

    • Modifies service

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Account Manipulation

1
T1098

Registry Run Keys / Startup Folder

1
T1060

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

3
T1112

File Permissions Modification

1
T1222

Lateral Movement

Remote Desktop Protocol

1
T1076

Tasks