General
-
Target
ec52461953bc8f522572c62a76db3299.exe
-
Size
6.0MB
-
Sample
210331-5nlpqgbtze
-
MD5
ec52461953bc8f522572c62a76db3299
-
SHA1
6a9f72dca7ea4ca3489544b5f6bb54d214a20dec
-
SHA256
fbf79b0e54a606ba74f107e39790bccf1fce6a4f9be65353f97b2a03b43c1c6f
-
SHA512
6c2741a62c86526a1471d43d05d2e7cf6cf48d2653005010320144214eee5632a8e63eced1a82a3a6cba209ff5a1161a5864b49b3cdcb590ac5e2834ea53776d
Static task
static1
Behavioral task
behavioral1
Sample
ec52461953bc8f522572c62a76db3299.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
ec52461953bc8f522572c62a76db3299.exe
Resource
win10v20201028
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
ec52461953bc8f522572c62a76db3299.exe
-
Size
6.0MB
-
MD5
ec52461953bc8f522572c62a76db3299
-
SHA1
6a9f72dca7ea4ca3489544b5f6bb54d214a20dec
-
SHA256
fbf79b0e54a606ba74f107e39790bccf1fce6a4f9be65353f97b2a03b43c1c6f
-
SHA512
6c2741a62c86526a1471d43d05d2e7cf6cf48d2653005010320144214eee5632a8e63eced1a82a3a6cba209ff5a1161a5864b49b3cdcb590ac5e2834ea53776d
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies file permissions
-
Drops file in System32 directory
-