General
-
Target
b1c13501a44f3017537f296fc3cd4919.exe
-
Size
6.0MB
-
Sample
210526-1g3zn6yvls
-
MD5
b1c13501a44f3017537f296fc3cd4919
-
SHA1
10b0f90e3d298a6b1ca3dc8afec91683203a7161
-
SHA256
80271a13696df77f092c3b6abce154f98e83f5840c64b610af7ae83cfe711482
-
SHA512
abbce9675cd8921705e463c5eb702a6832736ba5a95705da79658ff4be2d39dfc1223a727d2bac23a67fbaae85a7e658e97e7332370caf17a6af700b4090c3ec
Static task
static1
Behavioral task
behavioral1
Sample
b1c13501a44f3017537f296fc3cd4919.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
b1c13501a44f3017537f296fc3cd4919.exe
Resource
win10v20210408
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
b1c13501a44f3017537f296fc3cd4919.exe
-
Size
6.0MB
-
MD5
b1c13501a44f3017537f296fc3cd4919
-
SHA1
10b0f90e3d298a6b1ca3dc8afec91683203a7161
-
SHA256
80271a13696df77f092c3b6abce154f98e83f5840c64b610af7ae83cfe711482
-
SHA512
abbce9675cd8921705e463c5eb702a6832736ba5a95705da79658ff4be2d39dfc1223a727d2bac23a67fbaae85a7e658e97e7332370caf17a6af700b4090c3ec
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies file permissions
-
Drops file in System32 directory
-