General

  • Target

    1d3ee4783ce7a30a7fd422f5abe7ba25

  • Size

    5.7MB

  • Sample

    210712-9t8nhqve86

  • MD5

    1d3ee4783ce7a30a7fd422f5abe7ba25

  • SHA1

    81073e407e3e61f102c414e797e99a46cb31d766

  • SHA256

    f9fe730178dcb234b908d759db705a9f78c1505df5bd5c09a5369a6f9ed2363b

  • SHA512

    5218273891d304f9ddb88c61e984fcee2b955b8789292419e3f78c6d48dbf35dcadb77dd9f7942175bafb4a96a2462c3f48886e277fe861c124548f995f652df

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1

Targets

    • Target

      1d3ee4783ce7a30a7fd422f5abe7ba25

    • Size

      5.7MB

    • MD5

      1d3ee4783ce7a30a7fd422f5abe7ba25

    • SHA1

      81073e407e3e61f102c414e797e99a46cb31d766

    • SHA256

      f9fe730178dcb234b908d759db705a9f78c1505df5bd5c09a5369a6f9ed2363b

    • SHA512

      5218273891d304f9ddb88c61e984fcee2b955b8789292419e3f78c6d48dbf35dcadb77dd9f7942175bafb4a96a2462c3f48886e277fe861c124548f995f652df

    • ServHelper

      ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocklisted process makes network request

    • Modifies RDP port number used by Windows

    • Possible privilege escalation attempt

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks