General

  • Target

    5367615a3d3f95eeab592a53716ed3bb.exe

  • Size

    5.7MB

  • Sample

    210924-xryqjahfh7

  • MD5

    5367615a3d3f95eeab592a53716ed3bb

  • SHA1

    8592c6e78aa592d9f135dbe9d97cf2f524dbeaed

  • SHA256

    af7e2ecb8e84ad61c276347e0e766e21a043f2119dacb19ae538bddf5d0452f0

  • SHA512

    383fada6525e8ced7cc40c14d6cb6718583da6dca4f7db2654c15c0842a692d2011364da6f53690f005ed33f90606e81836eefeb8df04de655904fa5776b8790

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1

Targets

    • Target

      5367615a3d3f95eeab592a53716ed3bb.exe

    • Size

      5.7MB

    • MD5

      5367615a3d3f95eeab592a53716ed3bb

    • SHA1

      8592c6e78aa592d9f135dbe9d97cf2f524dbeaed

    • SHA256

      af7e2ecb8e84ad61c276347e0e766e21a043f2119dacb19ae538bddf5d0452f0

    • SHA512

      383fada6525e8ced7cc40c14d6cb6718583da6dca4f7db2654c15c0842a692d2011364da6f53690f005ed33f90606e81836eefeb8df04de655904fa5776b8790

    • ServHelper

      ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocklisted process makes network request

    • Modifies RDP port number used by Windows

    • Possible privilege escalation attempt

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks