MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3c41569f2ba7a3e123f2156e541c52fc924897a49a34139b87d5a1b93fb1f94d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ServHelper


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 3c41569f2ba7a3e123f2156e541c52fc924897a49a34139b87d5a1b93fb1f94d
SHA3-384 hash: f7d27a342bd3bd9f056af2cc154db42c59e638c61a5d23ec2d3bc1f240c071b8d277091ee0fa901a4f51725b0d7b39b2
SHA1 hash: ca9b8ed3f8d10d1e01411eb66e80549039e7591d
MD5 hash: 63c81bd2299db58959013ff55b6f3698
humanhash: lion-four-south-kentucky
File name:63c81bd2299db58959013ff55b6f3698
Download: download sample
Signature ServHelper
File size:7'298'158 bytes
First seen:2021-06-13 11:45:20 UTC
Last seen:2021-06-13 12:39:34 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 011a034751880c1944da3b5ecc18520d (8 x RedLineStealer, 4 x CryptBot, 3 x ArkeiStealer)
ssdeep 196608:5NhTIvtDeVjU+9cy9Vtg0HPZEPhCQ4eDv1MtWDd:5XTIMVjU+9PtzPOgQ4eDQY
TLSH E5761110E683936AC86BFBF9B05DF27941A45D7F1B1886D37770FED528E4E848229630
Reporter zbetcheckin
Tags:32 exe ServHelper

Intelligence


File Origin
# of uploads :
2
# of downloads :
1'598
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
63c81bd2299db58959013ff55b6f3698
Verdict:
Suspicious activity
Analysis date:
2021-06-13 11:47:52 UTC
Tags:
autoit

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Creating a process from a recently created file
Sending a UDP request
Deleting a recently created file
DNS request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
84 / 100
Signature
Bypasses PowerShell execution policy
Contains functionality to register a low level keyboard hook
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Obfuscated command line found
Sigma detected: Suspicious Csc.exe Source File Folder
Submitted sample is a known malware sample
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected Costura Assembly Loader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 433699 Sample: 2xnZmsI7Lz Startdate: 13/06/2021 Architecture: WINDOWS Score: 84 64 raw.githubusercontent.com 2->64 66 asdjausg.cn 2->66 80 Multi AV Scanner detection for submitted file 2->80 82 Sigma detected: Suspicious Csc.exe Source File Folder 2->82 84 Yara detected Costura Assembly Loader 2->84 14 2xnZmsI7Lz.exe 7 2->14         started        signatures3 process4 signatures5 96 Contains functionality to register a low level keyboard hook 14->96 17 cmd.exe 1 14->17         started        process6 signatures7 72 Submitted sample is a known malware sample 17->72 74 Obfuscated command line found 17->74 76 Uses ping.exe to sleep 17->76 78 Uses ping.exe to check the status of other devices and networks 17->78 20 cmd.exe 3 17->20         started        23 conhost.exe 17->23         started        process8 signatures9 90 Obfuscated command line found 20->90 92 Uses ping.exe to sleep 20->92 25 Lume.exe.com 20->25         started        28 PING.EXE 1 20->28         started        31 findstr.exe 1 20->31         started        process10 dnsIp11 94 Bypasses PowerShell execution policy 25->94 34 Lume.exe.com 25->34         started        70 127.0.0.1 unknown unknown 28->70 62 C:\Users\user\AppData\Local\...\Lume.exe.com, Targa 31->62 dropped file12 signatures13 process14 dnsIp15 68 DRkDkBgEuFtY.DRkDkBgEuFtY 34->68 86 Modifies the context of a thread in another process (thread injection) 34->86 88 Injects a PE file into a foreign processes 34->88 38 Lume.exe.com 4 34->38         started        signatures16 process17 process18 40 powershell.exe 39 38->40         started        file19 58 C:\Users\user\AppData\...\2lumxfuj.cmdline, UTF-8 40->58 dropped 43 csc.exe 40->43         started        46 powershell.exe 40->46         started        48 powershell.exe 40->48         started        50 conhost.exe 40->50         started        process20 file21 60 C:\Users\user\AppData\Local\...\2lumxfuj.dll, PE32 43->60 dropped 52 cvtres.exe 43->52         started        54 conhost.exe 46->54         started        56 conhost.exe 48->56         started        process22
Threat name:
Win32.Trojan.Crypzip
Status:
Malicious
First seen:
2021-06-13 11:46:12 UTC
File Type:
PE (Exe)
Extracted files:
26
AV detection:
5 of 29 (17.24%)
Threat level:
  5/5
Result
Malware family:
servhelper
Score:
  10/10
Tags:
family:servhelper backdoor discovery exploit persistence trojan upx
Behaviour
Modifies data under HKEY_USERS
Modifies registry key
Runs net.exe
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Deletes itself
Loads dropped DLL
Modifies file permissions
Blocklisted process makes network request
Executes dropped EXE
Modifies RDP port number used by Windows
Possible privilege escalation attempt
Sets DLL path for service in the registry
UPX packed file
Grants admin privileges
ServHelper
Malware Config
Dropper Extraction:
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Unpacked files
SH256 hash:
3c41569f2ba7a3e123f2156e541c52fc924897a49a34139b87d5a1b93fb1f94d
MD5 hash:
63c81bd2299db58959013ff55b6f3698
SHA1 hash:
ca9b8ed3f8d10d1e01411eb66e80549039e7591d
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ServHelper

Executable exe 3c41569f2ba7a3e123f2156e541c52fc924897a49a34139b87d5a1b93fb1f94d

(this sample)

  
Delivery method
Distributed via web download

Comments