General
-
Target
a09dcec94458d1970ded54ec374167cd227fea6ff4b56effa1755926d7bd5f41
-
Size
6.8MB
-
Sample
240410-p896wsbf91
-
MD5
d088405edcf61c7fb54b260bc6315a31
-
SHA1
997f482fcca4cc5704bb0bf8b47132dd34aa0a37
-
SHA256
a09dcec94458d1970ded54ec374167cd227fea6ff4b56effa1755926d7bd5f41
-
SHA512
1bc794a0c84525d67b8a3aecdd4544942cced8996f0b04fa8da1649a14fdd746638ba87b850c3046a3e82c1a455c2168802fe85b45b86436ca2515885e7bb86c
-
SSDEEP
98304:q7WKfdq7RyQdh/ha7TTOzAElMLmZ7oo8kTApKGaRqc4O1XujlqScYEYrsG3AH:qCUdcRwfTTLmxoQT7RRq4ujltcYN9w
Behavioral task
behavioral1
Sample
a09dcec94458d1970ded54ec374167cd227fea6ff4b56effa1755926d7bd5f41.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
a09dcec94458d1970ded54ec374167cd227fea6ff4b56effa1755926d7bd5f41.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Targets
-
-
Target
a09dcec94458d1970ded54ec374167cd227fea6ff4b56effa1755926d7bd5f41
-
Size
6.8MB
-
MD5
d088405edcf61c7fb54b260bc6315a31
-
SHA1
997f482fcca4cc5704bb0bf8b47132dd34aa0a37
-
SHA256
a09dcec94458d1970ded54ec374167cd227fea6ff4b56effa1755926d7bd5f41
-
SHA512
1bc794a0c84525d67b8a3aecdd4544942cced8996f0b04fa8da1649a14fdd746638ba87b850c3046a3e82c1a455c2168802fe85b45b86436ca2515885e7bb86c
-
SSDEEP
98304:q7WKfdq7RyQdh/ha7TTOzAElMLmZ7oo8kTApKGaRqc4O1XujlqScYEYrsG3AH:qCUdcRwfTTLmxoQT7RRq4ujltcYN9w
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Modifies RDP port number used by Windows
-
Possible privilege escalation attempt
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Modifies file permissions
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-