General
-
Target
faef9c278a4e0ad4686985084bea37e9.exe
-
Size
657KB
-
Sample
210709-jgr4pxcgx2
-
MD5
faef9c278a4e0ad4686985084bea37e9
-
SHA1
c458d3a9503d9e43bda33176d0062741f9810747
-
SHA256
10d971c860d4f8ad93b86f47fbc0cd285897769dd60bb68dea4377bb6e7d6f1f
-
SHA512
951be756138fb6aeeb5e77a5b3f9280d2945ffb25527cb1732fb5dc927bbe6dbf3b4ccf94ce468c83d15c3d590d49286bdb12fb86d7350f8812fbf49978cdeea
Static task
static1
Behavioral task
behavioral1
Sample
faef9c278a4e0ad4686985084bea37e9.exe
Resource
win7v20210410
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Extracted
vidar
39.4
313
https://sergeevih43.tumblr.com/
-
profile_id
313
Targets
-
-
Target
faef9c278a4e0ad4686985084bea37e9.exe
-
Size
657KB
-
MD5
faef9c278a4e0ad4686985084bea37e9
-
SHA1
c458d3a9503d9e43bda33176d0062741f9810747
-
SHA256
10d971c860d4f8ad93b86f47fbc0cd285897769dd60bb68dea4377bb6e7d6f1f
-
SHA512
951be756138fb6aeeb5e77a5b3f9280d2945ffb25527cb1732fb5dc927bbe6dbf3b4ccf94ce468c83d15c3d590d49286bdb12fb86d7350f8812fbf49978cdeea
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Vidar Stealer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Deletes itself
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-