General
-
Target
ViJoy.bin
-
Size
6.0MB
-
Sample
210721-181y71wc52
-
MD5
03051f3c44a2c8d196c95ea458b0aff4
-
SHA1
d19a86e11cccdf978ca2d1455d7026d7879869f7
-
SHA256
555f654fb51e632ba2cf49b865b6de5f5772ffba0229d73021a1c6a6f65dab08
-
SHA512
883e31033107ee9f008d34e84638fca2ee085e6cc7c41a288d1663a31beac7109efe718ab7f38f682c8e01a99736e3832c539c95fd4bf25124fed4c9e9eeba46
Static task
static1
Behavioral task
behavioral1
Sample
ViJoy.bin.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
ViJoy.bin.exe
Resource
win10v20210410
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
ViJoy.bin
-
Size
6.0MB
-
MD5
03051f3c44a2c8d196c95ea458b0aff4
-
SHA1
d19a86e11cccdf978ca2d1455d7026d7879869f7
-
SHA256
555f654fb51e632ba2cf49b865b6de5f5772ffba0229d73021a1c6a6f65dab08
-
SHA512
883e31033107ee9f008d34e84638fca2ee085e6cc7c41a288d1663a31beac7109efe718ab7f38f682c8e01a99736e3832c539c95fd4bf25124fed4c9e9eeba46
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies file permissions
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-