General
-
Target
a81d0099ecd54a32aa6b858544b82a809237cddc903b45b032618d93ef7f70f3
-
Size
4.5MB
-
Sample
220131-3ppmqsebc9
-
MD5
d9825d1424b9058fd87f5bb6e808346a
-
SHA1
21980e67e2bba65b9753021e9091c2ab7c99f3e3
-
SHA256
a81d0099ecd54a32aa6b858544b82a809237cddc903b45b032618d93ef7f70f3
-
SHA512
7359f0bc4f06f48b8a60764ba142bf7650cee52cfa8499142686c846abc8366faf6f8746573ec370eef64e6c92b5999e8e22f9521c4da91626d7d783883a0cef
Static task
static1
Behavioral task
behavioral1
Sample
a81d0099ecd54a32aa6b858544b82a809237cddc903b45b032618d93ef7f70f3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a81d0099ecd54a32aa6b858544b82a809237cddc903b45b032618d93ef7f70f3.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
a81d0099ecd54a32aa6b858544b82a809237cddc903b45b032618d93ef7f70f3
-
Size
4.5MB
-
MD5
d9825d1424b9058fd87f5bb6e808346a
-
SHA1
21980e67e2bba65b9753021e9091c2ab7c99f3e3
-
SHA256
a81d0099ecd54a32aa6b858544b82a809237cddc903b45b032618d93ef7f70f3
-
SHA512
7359f0bc4f06f48b8a60764ba142bf7650cee52cfa8499142686c846abc8366faf6f8746573ec370eef64e6c92b5999e8e22f9521c4da91626d7d783883a0cef
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Loads dropped DLL
-
Modifies file permissions
-
Drops file in System32 directory
-