General

  • Target

    1aa9dda1b9b413444b0668500611c7f3

  • Size

    7.2MB

  • Sample

    210824-rmbd5ab3g6

  • MD5

    1aa9dda1b9b413444b0668500611c7f3

  • SHA1

    d980ac83bf107df1a7510ad94304a7e364d927a5

  • SHA256

    02031c62d916cdd41d26a271e93ec5b06eabfa910187207b02ead07fd480c2a9

  • SHA512

    37a301fd61c42c10f774950826469f215a20a24d783316febfeafd0fa06d88f536daa4d5d10153fd1ec42cc778d87716fe5b4bb9782c03e86a4e3b336e9efd53

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1

Targets

    • Target

      1aa9dda1b9b413444b0668500611c7f3

    • Size

      7.2MB

    • MD5

      1aa9dda1b9b413444b0668500611c7f3

    • SHA1

      d980ac83bf107df1a7510ad94304a7e364d927a5

    • SHA256

      02031c62d916cdd41d26a271e93ec5b06eabfa910187207b02ead07fd480c2a9

    • SHA512

      37a301fd61c42c10f774950826469f215a20a24d783316febfeafd0fa06d88f536daa4d5d10153fd1ec42cc778d87716fe5b4bb9782c03e86a4e3b336e9efd53

    • ServHelper

      ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Modifies RDP port number used by Windows

    • Possible privilege escalation attempt

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks