General
-
Target
Start.bin.zip
-
Size
372KB
-
Sample
210704-wwxhxfv7wn
-
MD5
72545151524347bdedb069a0970df6f1
-
SHA1
13bbc0a727ad572143b5b81d7425d153f04df8c1
-
SHA256
2487b8cf4cd64c80b809762afda3a559738797c225ce5ab7961f4bfcee2a0ba2
-
SHA512
ad3c6c34def03da9837a8f84aa9412101ccff03077a6d522aa46b48d9c611631ac9678b5e017f168980f156182fe7dd72ae97d6e6999fb35955ca094710a5126
Static task
static1
Behavioral task
behavioral1
Sample
Start.bin.exe
Resource
win7v20210410
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
Start.bin
-
Size
472KB
-
MD5
14a480e8136dcbfc14e672544b33be76
-
SHA1
fba00115c76fd3b09fd78d1b49c45d6429ca61f1
-
SHA256
aef92dab31f523e018f6f40e12e0c573dce91f70f5bfed134565bdb764ce8459
-
SHA512
b5091cfe3b3881ca2a7de88aa0ba381cc07387c3cc5d623d1ac491723da15f66b922e23d2a4c379a07114ff1480e2773e9356abca137cafa8ed5cff5ff2113a4
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Deletes itself
-
Loads dropped DLL
-
Modifies file permissions
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-