General

  • Target

    SecuriteInfo.com.Trojan.MulDrop16.34669.6160.17841

  • Size

    6.0MB

  • Sample

    210324-8ze2qq1ye6

  • MD5

    414336afee7e93cb70df4b5f250a01c4

  • SHA1

    ea9fbb798fd5287efaff8d8f0ff68f01e02521b4

  • SHA256

    ec85f413a53709831c4f1774f78d009dcf2f531006484a3b396992703bba2da1

  • SHA512

    b0d4924e10b76e83547507ea0eb79e19441e4d959b72ec44cf43cdc635c21703c35d00a55bf190f528532ffaf5953717805bcbd82d7381f4204a7d727b01f105

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1

Targets

    • Target

      SecuriteInfo.com.Trojan.MulDrop16.34669.6160.17841

    • Size

      6.0MB

    • MD5

      414336afee7e93cb70df4b5f250a01c4

    • SHA1

      ea9fbb798fd5287efaff8d8f0ff68f01e02521b4

    • SHA256

      ec85f413a53709831c4f1774f78d009dcf2f531006484a3b396992703bba2da1

    • SHA512

      b0d4924e10b76e83547507ea0eb79e19441e4d959b72ec44cf43cdc635c21703c35d00a55bf190f528532ffaf5953717805bcbd82d7381f4204a7d727b01f105

    • ServHelper

      ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocklisted process makes network request

    • Modifies RDP port number used by Windows

    • Possible privilege escalation attempt

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks