General
-
Target
1adc9f803f891d4e17075a18e0aab339.exe
-
Size
6.1MB
-
Sample
210423-31dg7gfp3j
-
MD5
1adc9f803f891d4e17075a18e0aab339
-
SHA1
88ad0855e333445a35fe8fb81795fea9f353ec39
-
SHA256
58850f83f71b00a7611d7d6011c5a21cc3cb34b59df0d258f16215a0f95f1408
-
SHA512
d1f20d8c2d60e5849c40581c1c40c553648177df2cd30df66d854ce5481f16a5fa3826bb9243a970a438dce2efa815b408b9d52eb126eab6d437af87a1d638ce
Static task
static1
Behavioral task
behavioral1
Sample
1adc9f803f891d4e17075a18e0aab339.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
1adc9f803f891d4e17075a18e0aab339.exe
Resource
win10v20210410
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
1adc9f803f891d4e17075a18e0aab339.exe
-
Size
6.1MB
-
MD5
1adc9f803f891d4e17075a18e0aab339
-
SHA1
88ad0855e333445a35fe8fb81795fea9f353ec39
-
SHA256
58850f83f71b00a7611d7d6011c5a21cc3cb34b59df0d258f16215a0f95f1408
-
SHA512
d1f20d8c2d60e5849c40581c1c40c553648177df2cd30df66d854ce5481f16a5fa3826bb9243a970a438dce2efa815b408b9d52eb126eab6d437af87a1d638ce
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies file permissions
-
Drops file in System32 directory
-