General
-
Target
d063fbcc3d30dfb51efdae96e4232813.exe
-
Size
6.0MB
-
Sample
210325-kwqfn85bdn
-
MD5
d063fbcc3d30dfb51efdae96e4232813
-
SHA1
d7934d41583758a2b713a8278d36e5e27c178a37
-
SHA256
5090fa74f83368086c1d197dcd28e51f8b36cd5d2c18e9a964d925a445ea0066
-
SHA512
bacb8305dd9ba9f0cbce4d56d67ac50ae825f52007d091e16fec111c2af4758294710129adbd0786e5cdfca2cd289e888e4b1e7b696957f0a87181d23011248a
Static task
static1
Behavioral task
behavioral1
Sample
d063fbcc3d30dfb51efdae96e4232813.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
d063fbcc3d30dfb51efdae96e4232813.exe
Resource
win10v20201028
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
d063fbcc3d30dfb51efdae96e4232813.exe
-
Size
6.0MB
-
MD5
d063fbcc3d30dfb51efdae96e4232813
-
SHA1
d7934d41583758a2b713a8278d36e5e27c178a37
-
SHA256
5090fa74f83368086c1d197dcd28e51f8b36cd5d2c18e9a964d925a445ea0066
-
SHA512
bacb8305dd9ba9f0cbce4d56d67ac50ae825f52007d091e16fec111c2af4758294710129adbd0786e5cdfca2cd289e888e4b1e7b696957f0a87181d23011248a
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies file permissions
-
Drops file in System32 directory
-