General
-
Target
878c2cdccd93c49e71955beae55dd32f5398594c95112878cd4f63d04fa47cdb
-
Size
4.5MB
-
Sample
220201-afzr5aeea8
-
MD5
9ff7912602cfde4249eeffb1b8c1c10a
-
SHA1
89326801da83ca97b684f39a92885042c038c0fc
-
SHA256
878c2cdccd93c49e71955beae55dd32f5398594c95112878cd4f63d04fa47cdb
-
SHA512
bf2e70dbdd9c7bcba67a38ec7cb765b2269ad868fad0ad2cd26e59dafb7c1c33738d466e7a30dbcd583f2746ca60ef32263d1b2543abe634aeb023bec6cd3617
Static task
static1
Behavioral task
behavioral1
Sample
878c2cdccd93c49e71955beae55dd32f5398594c95112878cd4f63d04fa47cdb.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
878c2cdccd93c49e71955beae55dd32f5398594c95112878cd4f63d04fa47cdb.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
878c2cdccd93c49e71955beae55dd32f5398594c95112878cd4f63d04fa47cdb
-
Size
4.5MB
-
MD5
9ff7912602cfde4249eeffb1b8c1c10a
-
SHA1
89326801da83ca97b684f39a92885042c038c0fc
-
SHA256
878c2cdccd93c49e71955beae55dd32f5398594c95112878cd4f63d04fa47cdb
-
SHA512
bf2e70dbdd9c7bcba67a38ec7cb765b2269ad868fad0ad2cd26e59dafb7c1c33738d466e7a30dbcd583f2746ca60ef32263d1b2543abe634aeb023bec6cd3617
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies file permissions
-
Drops file in System32 directory
-