General
-
Target
b4b4e78ce6633cc8662dfde524de61a8bdfdc92c0f69fb9e3d68f6f34597dde5
-
Size
3.8MB
-
Sample
220208-cx9d1acbg4
-
MD5
213d018805394eb6e12f57005f1d45e0
-
SHA1
b01887dc649cb1209abdad8ce9ea59ec33d1c6b2
-
SHA256
b4b4e78ce6633cc8662dfde524de61a8bdfdc92c0f69fb9e3d68f6f34597dde5
-
SHA512
c0334c5e90c3e5edd09c9ac7a7c5792bcdf43b4fd9362e5c573d6f0729d5c71db611967a9d5c417d430575a951e6270d7049879711db1a38598a2f16d486233c
Static task
static1
Behavioral task
behavioral1
Sample
b4b4e78ce6633cc8662dfde524de61a8bdfdc92c0f69fb9e3d68f6f34597dde5.ps1
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b4b4e78ce6633cc8662dfde524de61a8bdfdc92c0f69fb9e3d68f6f34597dde5.ps1
Resource
win10v2004-en-20220113
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
b4b4e78ce6633cc8662dfde524de61a8bdfdc92c0f69fb9e3d68f6f34597dde5
-
Size
3.8MB
-
MD5
213d018805394eb6e12f57005f1d45e0
-
SHA1
b01887dc649cb1209abdad8ce9ea59ec33d1c6b2
-
SHA256
b4b4e78ce6633cc8662dfde524de61a8bdfdc92c0f69fb9e3d68f6f34597dde5
-
SHA512
c0334c5e90c3e5edd09c9ac7a7c5792bcdf43b4fd9362e5c573d6f0729d5c71db611967a9d5c417d430575a951e6270d7049879711db1a38598a2f16d486233c
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Deletes itself
-
Loads dropped DLL
-
Modifies file permissions
-
Drops file in System32 directory
-