General

  • Target

    Start.bin.zip

  • Size

    372KB

  • Sample

    210704-wwxhxfv7wn

  • MD5

    72545151524347bdedb069a0970df6f1

  • SHA1

    13bbc0a727ad572143b5b81d7425d153f04df8c1

  • SHA256

    2487b8cf4cd64c80b809762afda3a559738797c225ce5ab7961f4bfcee2a0ba2

  • SHA512

    ad3c6c34def03da9837a8f84aa9412101ccff03077a6d522aa46b48d9c611631ac9678b5e017f168980f156182fe7dd72ae97d6e6999fb35955ca094710a5126

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1

Targets

    • Target

      Start.bin

    • Size

      472KB

    • MD5

      14a480e8136dcbfc14e672544b33be76

    • SHA1

      fba00115c76fd3b09fd78d1b49c45d6429ca61f1

    • SHA256

      aef92dab31f523e018f6f40e12e0c573dce91f70f5bfed134565bdb764ce8459

    • SHA512

      b5091cfe3b3881ca2a7de88aa0ba381cc07387c3cc5d623d1ac491723da15f66b922e23d2a4c379a07114ff1480e2773e9356abca137cafa8ed5cff5ff2113a4

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • ServHelper

      ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies RDP port number used by Windows

    • Possible privilege escalation attempt

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks