General
-
Target
df2cda7268742a64ff9f639ea838b375b3a0d12bcf01afec13bccafb8abdefe1
-
Size
340KB
-
Sample
211027-zlgwyagdh9
-
MD5
a3462aada89ad7cc91f3850fbd41bd21
-
SHA1
21029d650dd17a48c81c76f72d7c1c47dae9de46
-
SHA256
df2cda7268742a64ff9f639ea838b375b3a0d12bcf01afec13bccafb8abdefe1
-
SHA512
23177bd4fe2ad3a784371236cefd3775e17a008579db04226a9e6a5d68b3850d1d930fc7a5d7ba5e7a47b006c950a17e114b6c76ef524eecaf62926fac6982f8
Static task
static1
Behavioral task
behavioral1
Sample
df2cda7268742a64ff9f639ea838b375b3a0d12bcf01afec13bccafb8abdefe1.exe
Resource
win10-en-20210920
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Extracted
smokeloader
2020
http://brandyjaggers.com/upload/
http://andbal.com/upload/
http://alotofquotes.com/upload/
http://szpnc.cn/upload/
http://uggeboots.com/upload/
http://100klv.com/upload/
http://rapmusic.at/upload/
Targets
-
-
Target
df2cda7268742a64ff9f639ea838b375b3a0d12bcf01afec13bccafb8abdefe1
-
Size
340KB
-
MD5
a3462aada89ad7cc91f3850fbd41bd21
-
SHA1
21029d650dd17a48c81c76f72d7c1c47dae9de46
-
SHA256
df2cda7268742a64ff9f639ea838b375b3a0d12bcf01afec13bccafb8abdefe1
-
SHA512
23177bd4fe2ad3a784371236cefd3775e17a008579db04226a9e6a5d68b3850d1d930fc7a5d7ba5e7a47b006c950a17e114b6c76ef524eecaf62926fac6982f8
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies RDP port number used by Windows
-
Sets DLL path for service in the registry
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Drops file in System32 directory
-