General
-
Target
92068f4e5a7e704caf1fad1665121757.exe
-
Size
6.0MB
-
Sample
210329-8s4z2jsykx
-
MD5
92068f4e5a7e704caf1fad1665121757
-
SHA1
63af0fcb20bc4abb452c53455a9955dc210334bb
-
SHA256
4411d8a69230284cb6238a2e8cf29878afbbef90935bb94d1a6f8d59af30c6cc
-
SHA512
2e4688b7a1924cfab40984efa51533d1e712222ce9c11d00df9da19c65405840da6182068f16bc1a5fe74753d83ea2324bf3ff9e9e527726dc3e7cfd89aaa741
Static task
static1
Behavioral task
behavioral1
Sample
92068f4e5a7e704caf1fad1665121757.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
92068f4e5a7e704caf1fad1665121757.exe
Resource
win10v20201028
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
92068f4e5a7e704caf1fad1665121757.exe
-
Size
6.0MB
-
MD5
92068f4e5a7e704caf1fad1665121757
-
SHA1
63af0fcb20bc4abb452c53455a9955dc210334bb
-
SHA256
4411d8a69230284cb6238a2e8cf29878afbbef90935bb94d1a6f8d59af30c6cc
-
SHA512
2e4688b7a1924cfab40984efa51533d1e712222ce9c11d00df9da19c65405840da6182068f16bc1a5fe74753d83ea2324bf3ff9e9e527726dc3e7cfd89aaa741
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies file permissions
-
Drops file in System32 directory
-