General
-
Target
52abd9b0522751f14763b92baf4afa37.exe
-
Size
6.0MB
-
Sample
210529-p5lnp3raqj
-
MD5
52abd9b0522751f14763b92baf4afa37
-
SHA1
fd96f6abb4517f9c8d8add8cf46a88c2dc12d247
-
SHA256
c8259fbe6995239c22a918f08e6cde30c181a725e9a1c379adbef5ecfbd35d63
-
SHA512
b41342efbb7a4f06e6584d5550946f30870e539c8bd118bd0d3734e0b90bc345ada9689b0b71786807e05e7f8a43a551644ac77418aacf0932faae5f33dd5e0c
Static task
static1
Behavioral task
behavioral1
Sample
52abd9b0522751f14763b92baf4afa37.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
52abd9b0522751f14763b92baf4afa37.exe
Resource
win10v20210408
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
52abd9b0522751f14763b92baf4afa37.exe
-
Size
6.0MB
-
MD5
52abd9b0522751f14763b92baf4afa37
-
SHA1
fd96f6abb4517f9c8d8add8cf46a88c2dc12d247
-
SHA256
c8259fbe6995239c22a918f08e6cde30c181a725e9a1c379adbef5ecfbd35d63
-
SHA512
b41342efbb7a4f06e6584d5550946f30870e539c8bd118bd0d3734e0b90bc345ada9689b0b71786807e05e7f8a43a551644ac77418aacf0932faae5f33dd5e0c
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies file permissions
-
Drops file in System32 directory
-