General
-
Target
fa984c86c9ffa1933559eaaf67b927b2b389a71977754f68841a2cde9e065ed6
-
Size
4.5MB
-
Sample
220131-12cgtsdbe5
-
MD5
6e25c5952efe42d73b7d20ed3d48199b
-
SHA1
ffc74cf6eebcf8129bc565aec41b41e7b1f84e0c
-
SHA256
fa984c86c9ffa1933559eaaf67b927b2b389a71977754f68841a2cde9e065ed6
-
SHA512
8ebb2206cbc8605613d894930e8982b0a424e1f8be3ad649b0237c78dfe4f75ff1691958e9a91f83286407466852c5199ec913d9cf1fd1ecaa0cde5eb8af5bb6
Static task
static1
Behavioral task
behavioral1
Sample
fa984c86c9ffa1933559eaaf67b927b2b389a71977754f68841a2cde9e065ed6.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
fa984c86c9ffa1933559eaaf67b927b2b389a71977754f68841a2cde9e065ed6.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
fa984c86c9ffa1933559eaaf67b927b2b389a71977754f68841a2cde9e065ed6
-
Size
4.5MB
-
MD5
6e25c5952efe42d73b7d20ed3d48199b
-
SHA1
ffc74cf6eebcf8129bc565aec41b41e7b1f84e0c
-
SHA256
fa984c86c9ffa1933559eaaf67b927b2b389a71977754f68841a2cde9e065ed6
-
SHA512
8ebb2206cbc8605613d894930e8982b0a424e1f8be3ad649b0237c78dfe4f75ff1691958e9a91f83286407466852c5199ec913d9cf1fd1ecaa0cde5eb8af5bb6
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies file permissions
-
Drops file in System32 directory
-