General
-
Target
5367615a3d3f95eeab592a53716ed3bb.exe
-
Size
5.7MB
-
Sample
210924-xryqjahfh7
-
MD5
5367615a3d3f95eeab592a53716ed3bb
-
SHA1
8592c6e78aa592d9f135dbe9d97cf2f524dbeaed
-
SHA256
af7e2ecb8e84ad61c276347e0e766e21a043f2119dacb19ae538bddf5d0452f0
-
SHA512
383fada6525e8ced7cc40c14d6cb6718583da6dca4f7db2654c15c0842a692d2011364da6f53690f005ed33f90606e81836eefeb8df04de655904fa5776b8790
Static task
static1
Behavioral task
behavioral1
Sample
5367615a3d3f95eeab592a53716ed3bb.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
5367615a3d3f95eeab592a53716ed3bb.exe
Resource
win10-en-20210920
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
5367615a3d3f95eeab592a53716ed3bb.exe
-
Size
5.7MB
-
MD5
5367615a3d3f95eeab592a53716ed3bb
-
SHA1
8592c6e78aa592d9f135dbe9d97cf2f524dbeaed
-
SHA256
af7e2ecb8e84ad61c276347e0e766e21a043f2119dacb19ae538bddf5d0452f0
-
SHA512
383fada6525e8ced7cc40c14d6cb6718583da6dca4f7db2654c15c0842a692d2011364da6f53690f005ed33f90606e81836eefeb8df04de655904fa5776b8790
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies file permissions
-
Drops file in System32 directory
-