General
-
Target
SecuriteInfo.com.Variant.Bulz.371365.8514.2555
-
Size
4.6MB
-
Sample
210306-d4llf4b9qn
-
MD5
d6f9cf363d1cdbf8c076f9198e19df01
-
SHA1
b70fe14eef9aa33bd33068514e192f259802c5f1
-
SHA256
6f7c097945c1602bbae27e4664004cf2139e66226f54b9499df311bdab804ebb
-
SHA512
373962c1533835c6b490310a3a7ae99d6cca22359017499dc9c607a2a06c373a34b55d2ac472c85596f76ac233e87f530ff21cd2b80b916554fbbf6fb7cee1a7
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Bulz.371365.8514.2555.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Bulz.371365.8514.2555.exe
Resource
win10v20201028
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
SecuriteInfo.com.Variant.Bulz.371365.8514.2555
-
Size
4.6MB
-
MD5
d6f9cf363d1cdbf8c076f9198e19df01
-
SHA1
b70fe14eef9aa33bd33068514e192f259802c5f1
-
SHA256
6f7c097945c1602bbae27e4664004cf2139e66226f54b9499df311bdab804ebb
-
SHA512
373962c1533835c6b490310a3a7ae99d6cca22359017499dc9c607a2a06c373a34b55d2ac472c85596f76ac233e87f530ff21cd2b80b916554fbbf6fb7cee1a7
Score10/10-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies file permissions
-
Drops file in System32 directory
-