General

  • Target

    fda3497d316553432df108a4f9d5e71c65577e89a8cb0283914c9eec058af6df

  • Size

    2.5MB

  • Sample

    220206-yr6xksbfg2

  • MD5

    869fe194f8f03c8286c2eda3ff0f80a1

  • SHA1

    e79eeafe149ddccd7d907035442f8c4072237b68

  • SHA256

    fda3497d316553432df108a4f9d5e71c65577e89a8cb0283914c9eec058af6df

  • SHA512

    41de9b349240fd4c4997c7d9df6b349f43d38c2c74e31384c01861be5b69d643d8825ea1a21f6540036fa714e3d904a6a0089abdce2b42f4764d6388143ec453

Malware Config

Targets

    • Target

      fda3497d316553432df108a4f9d5e71c65577e89a8cb0283914c9eec058af6df

    • Size

      2.5MB

    • MD5

      869fe194f8f03c8286c2eda3ff0f80a1

    • SHA1

      e79eeafe149ddccd7d907035442f8c4072237b68

    • SHA256

      fda3497d316553432df108a4f9d5e71c65577e89a8cb0283914c9eec058af6df

    • SHA512

      41de9b349240fd4c4997c7d9df6b349f43d38c2c74e31384c01861be5b69d643d8825ea1a21f6540036fa714e3d904a6a0089abdce2b42f4764d6388143ec453

    • ServHelper

      ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies RDP port number used by Windows

    • Possible privilege escalation attempt

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks