General
-
Target
63c81bd2299db58959013ff55b6f3698
-
Size
7.0MB
-
Sample
210613-36etlhm6gx
-
MD5
63c81bd2299db58959013ff55b6f3698
-
SHA1
ca9b8ed3f8d10d1e01411eb66e80549039e7591d
-
SHA256
3c41569f2ba7a3e123f2156e541c52fc924897a49a34139b87d5a1b93fb1f94d
-
SHA512
26af4f5aee0a015ac011eae176fcd65d9686ec60bcfaa05fb98d5e9078e2cd2d5f3b36cdcfe199def58140736d388205f19a50e0a1b50fc5d5c2f0aa951778cb
Static task
static1
Behavioral task
behavioral1
Sample
63c81bd2299db58959013ff55b6f3698.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
63c81bd2299db58959013ff55b6f3698.exe
Resource
win10v20210410
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
63c81bd2299db58959013ff55b6f3698
-
Size
7.0MB
-
MD5
63c81bd2299db58959013ff55b6f3698
-
SHA1
ca9b8ed3f8d10d1e01411eb66e80549039e7591d
-
SHA256
3c41569f2ba7a3e123f2156e541c52fc924897a49a34139b87d5a1b93fb1f94d
-
SHA512
26af4f5aee0a015ac011eae176fcd65d9686ec60bcfaa05fb98d5e9078e2cd2d5f3b36cdcfe199def58140736d388205f19a50e0a1b50fc5d5c2f0aa951778cb
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Deletes itself
-
Loads dropped DLL
-
Modifies file permissions
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-