General

  • Target

    0533044b6e65dbe2c84f78e43a37a0a0

  • Size

    5.7MB

  • Sample

    210626-32g598v7ta

  • MD5

    0533044b6e65dbe2c84f78e43a37a0a0

  • SHA1

    0513796322ed3364335eb9c47faad3324ff162fc

  • SHA256

    57bd1d7a3ce9a10797575f75af56a675b3739ab5901e383a7870b17fa328ecb4

  • SHA512

    b2dca40a006af96fdb10adc20d9ae8bdb4f3d47d7b179ffd2f3598b9ef8ffe940fc0145f438694ca2b9950c09cd625609824506bdc191ee9077116749406c6d6

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1

Targets

    • Target

      0533044b6e65dbe2c84f78e43a37a0a0

    • Size

      5.7MB

    • MD5

      0533044b6e65dbe2c84f78e43a37a0a0

    • SHA1

      0513796322ed3364335eb9c47faad3324ff162fc

    • SHA256

      57bd1d7a3ce9a10797575f75af56a675b3739ab5901e383a7870b17fa328ecb4

    • SHA512

      b2dca40a006af96fdb10adc20d9ae8bdb4f3d47d7b179ffd2f3598b9ef8ffe940fc0145f438694ca2b9950c09cd625609824506bdc191ee9077116749406c6d6

    • ServHelper

      ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Modifies RDP port number used by Windows

    • Possible privilege escalation attempt

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks