General
-
Target
b80e44d9eedd5fff1cd3ff0cfc1258af
-
Size
2.5MB
-
Sample
240306-wvyn9sff8z
-
MD5
b80e44d9eedd5fff1cd3ff0cfc1258af
-
SHA1
492003201b7f1a0a12230f2e245718de81bbad78
-
SHA256
f00f8b0d2602fc2e8bcf5899377f6a23beae9ea9df2c0a3c4e9aad4cae2ef522
-
SHA512
326c4b9296cc401c43fa9f138cb9eebf416baa0418084a1fc22b88e0cbfa1bfaaee4052c313b242b50cbd69663e2a943f9bd80beb84c735cca7b952fd881f47a
-
SSDEEP
24576:faToNdX2E3YlwTgGbjj9PNwQ16RQx3WE+ygGBwf7Lx7Nhq39M//qRiQlrUUDKKbu:CgdBx6QAE+kqhjqAqQQvmEloj4IXfBh
Static task
static1
Behavioral task
behavioral1
Sample
b80e44d9eedd5fff1cd3ff0cfc1258af.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b80e44d9eedd5fff1cd3ff0cfc1258af.ps1
Resource
win10v2004-20240226-en
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
b80e44d9eedd5fff1cd3ff0cfc1258af
-
Size
2.5MB
-
MD5
b80e44d9eedd5fff1cd3ff0cfc1258af
-
SHA1
492003201b7f1a0a12230f2e245718de81bbad78
-
SHA256
f00f8b0d2602fc2e8bcf5899377f6a23beae9ea9df2c0a3c4e9aad4cae2ef522
-
SHA512
326c4b9296cc401c43fa9f138cb9eebf416baa0418084a1fc22b88e0cbfa1bfaaee4052c313b242b50cbd69663e2a943f9bd80beb84c735cca7b952fd881f47a
-
SSDEEP
24576:faToNdX2E3YlwTgGbjj9PNwQ16RQx3WE+ygGBwf7Lx7Nhq39M//qRiQlrUUDKKbu:CgdBx6QAE+kqhjqAqQQvmEloj4IXfBh
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Deletes itself
-
Loads dropped DLL
-
Modifies file permissions
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-