General

  • Target

    ecd2d822106b3028f55f0adb383b22b4f308e0079cfcfcafb26227c4afe4ae05

  • Size

    3.4MB

  • Sample

    220418-ftgrcsbban

  • MD5

    71ee798de51093af096001f2d5dd5155

  • SHA1

    44876fea883580c63b054354d200dc5ade33d60d

  • SHA256

    ecd2d822106b3028f55f0adb383b22b4f308e0079cfcfcafb26227c4afe4ae05

  • SHA512

    0e2c4020973dec93f63a8818cb10b74851ee8c8469a2375805b318bbeec83a80d4f383c3682ce9989d661ac01a38e9c42dc5ed22b775d121323bd9823d174aab

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1

Targets

    • Target

      ecd2d822106b3028f55f0adb383b22b4f308e0079cfcfcafb26227c4afe4ae05

    • Size

      3.4MB

    • MD5

      71ee798de51093af096001f2d5dd5155

    • SHA1

      44876fea883580c63b054354d200dc5ade33d60d

    • SHA256

      ecd2d822106b3028f55f0adb383b22b4f308e0079cfcfcafb26227c4afe4ae05

    • SHA512

      0e2c4020973dec93f63a8818cb10b74851ee8c8469a2375805b318bbeec83a80d4f383c3682ce9989d661ac01a38e9c42dc5ed22b775d121323bd9823d174aab

    • ServHelper

      ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocklisted process makes network request

    • Modifies RDP port number used by Windows

    • Possible privilege escalation attempt

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Modifies file permissions

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Account Manipulation

1
T1098

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

File Permissions Modification

1
T1222

Lateral Movement

Remote Desktop Protocol

1
T1076

Command and Control

Web Service

1
T1102

Tasks