General

  • Target

    fb0da3d1d73bcd19970b18199109682c3eadacf33c066a02d17f1dd1f38275b1

  • Size

    3.4MB

  • Sample

    201115-1sx77qejd6

  • MD5

    e8b8bd2c147f0bf4aa3762b32b778351

  • SHA1

    a022f98fc7f16cb849ea2b6826eedd077db2360b

  • SHA256

    fb0da3d1d73bcd19970b18199109682c3eadacf33c066a02d17f1dd1f38275b1

  • SHA512

    0f0591aa79c39bd01cc7fe9b654e2709975c0eb47dce2abb8ddd2d7b49be8015a94b8f284a5ce94295ed7ebcecf6ded4346702672271b665d8873040938c9a9b

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1

Targets

    • Target

      fb0da3d1d73bcd19970b18199109682c3eadacf33c066a02d17f1dd1f38275b1

    • Size

      3.4MB

    • MD5

      e8b8bd2c147f0bf4aa3762b32b778351

    • SHA1

      a022f98fc7f16cb849ea2b6826eedd077db2360b

    • SHA256

      fb0da3d1d73bcd19970b18199109682c3eadacf33c066a02d17f1dd1f38275b1

    • SHA512

      0f0591aa79c39bd01cc7fe9b654e2709975c0eb47dce2abb8ddd2d7b49be8015a94b8f284a5ce94295ed7ebcecf6ded4346702672271b665d8873040938c9a9b

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blacklisted process makes network request

    • Modifies RDP port number used by Windows

    • Possible privilege escalation attempt

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

    • Modifies service

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Account Manipulation

1
T1098

Registry Run Keys / Startup Folder

1
T1060

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

3
T1112

File Permissions Modification

1
T1222

Lateral Movement

Remote Desktop Protocol

1
T1076

Tasks