General
-
Target
ecd2d822106b3028f55f0adb383b22b4f308e0079cfcfcafb26227c4afe4ae05
-
Size
3.4MB
-
Sample
220418-ftgrcsbban
-
MD5
71ee798de51093af096001f2d5dd5155
-
SHA1
44876fea883580c63b054354d200dc5ade33d60d
-
SHA256
ecd2d822106b3028f55f0adb383b22b4f308e0079cfcfcafb26227c4afe4ae05
-
SHA512
0e2c4020973dec93f63a8818cb10b74851ee8c8469a2375805b318bbeec83a80d4f383c3682ce9989d661ac01a38e9c42dc5ed22b775d121323bd9823d174aab
Static task
static1
Behavioral task
behavioral1
Sample
ecd2d822106b3028f55f0adb383b22b4f308e0079cfcfcafb26227c4afe4ae05.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ecd2d822106b3028f55f0adb383b22b4f308e0079cfcfcafb26227c4afe4ae05.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
ecd2d822106b3028f55f0adb383b22b4f308e0079cfcfcafb26227c4afe4ae05
-
Size
3.4MB
-
MD5
71ee798de51093af096001f2d5dd5155
-
SHA1
44876fea883580c63b054354d200dc5ade33d60d
-
SHA256
ecd2d822106b3028f55f0adb383b22b4f308e0079cfcfcafb26227c4afe4ae05
-
SHA512
0e2c4020973dec93f63a8818cb10b74851ee8c8469a2375805b318bbeec83a80d4f383c3682ce9989d661ac01a38e9c42dc5ed22b775d121323bd9823d174aab
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies file permissions
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-