General
-
Target
2355df7559b137125f35cc373a6fe4bd967b91fd207e705868f6d25a1e60003f
-
Size
4.2MB
-
Sample
220222-ndewtshcaq
-
MD5
470602a8aa144556803374fb94a210aa
-
SHA1
a04b54e71646fd4f70fec7a24b44932079755f5e
-
SHA256
2355df7559b137125f35cc373a6fe4bd967b91fd207e705868f6d25a1e60003f
-
SHA512
24020ea5d03d5b4527d24b7cc531729771e714e180d85fca8b1a8e01211f1e21fb339ffdcd6d04c1df8a1c2414fe281d86039be025ea92c72ffb3325cc1221eb
Static task
static1
Behavioral task
behavioral1
Sample
2355df7559b137125f35cc373a6fe4bd967b91fd207e705868f6d25a1e60003f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2355df7559b137125f35cc373a6fe4bd967b91fd207e705868f6d25a1e60003f.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
2355df7559b137125f35cc373a6fe4bd967b91fd207e705868f6d25a1e60003f
-
Size
4.2MB
-
MD5
470602a8aa144556803374fb94a210aa
-
SHA1
a04b54e71646fd4f70fec7a24b44932079755f5e
-
SHA256
2355df7559b137125f35cc373a6fe4bd967b91fd207e705868f6d25a1e60003f
-
SHA512
24020ea5d03d5b4527d24b7cc531729771e714e180d85fca8b1a8e01211f1e21fb339ffdcd6d04c1df8a1c2414fe281d86039be025ea92c72ffb3325cc1221eb
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies file permissions
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-