General

  • Target

    d063fbcc3d30dfb51efdae96e4232813.exe

  • Size

    6.0MB

  • Sample

    210325-kwqfn85bdn

  • MD5

    d063fbcc3d30dfb51efdae96e4232813

  • SHA1

    d7934d41583758a2b713a8278d36e5e27c178a37

  • SHA256

    5090fa74f83368086c1d197dcd28e51f8b36cd5d2c18e9a964d925a445ea0066

  • SHA512

    bacb8305dd9ba9f0cbce4d56d67ac50ae825f52007d091e16fec111c2af4758294710129adbd0786e5cdfca2cd289e888e4b1e7b696957f0a87181d23011248a

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1

Targets

    • Target

      d063fbcc3d30dfb51efdae96e4232813.exe

    • Size

      6.0MB

    • MD5

      d063fbcc3d30dfb51efdae96e4232813

    • SHA1

      d7934d41583758a2b713a8278d36e5e27c178a37

    • SHA256

      5090fa74f83368086c1d197dcd28e51f8b36cd5d2c18e9a964d925a445ea0066

    • SHA512

      bacb8305dd9ba9f0cbce4d56d67ac50ae825f52007d091e16fec111c2af4758294710129adbd0786e5cdfca2cd289e888e4b1e7b696957f0a87181d23011248a

    • ServHelper

      ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocklisted process makes network request

    • Modifies RDP port number used by Windows

    • Possible privilege escalation attempt

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks