MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 57bd1d7a3ce9a10797575f75af56a675b3739ab5901e383a7870b17fa328ecb4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ServHelper


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 57bd1d7a3ce9a10797575f75af56a675b3739ab5901e383a7870b17fa328ecb4
SHA3-384 hash: 10a7f63b5026b4fad2059451de5b9a8909e6b6b4a1e5be10d3a7f72b6e395350a078cf15e26e60f6057b48ce1548bb1c
SHA1 hash: 0513796322ed3364335eb9c47faad3324ff162fc
MD5 hash: 0533044b6e65dbe2c84f78e43a37a0a0
humanhash: zebra-saturn-india-beryllium
File name:0533044b6e65dbe2c84f78e43a37a0a0
Download: download sample
Signature ServHelper
File size:5'998'402 bytes
First seen:2021-06-26 19:17:49 UTC
Last seen:2021-06-26 19:36:59 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2b914b6fd04316572d777593dc737715 (4 x CryptBot, 4 x RedLineStealer, 3 x ServHelper)
ssdeep 98304:yUHwMgMDKQL8DUFLLINdC2G/htFMsrtzhvZ81OliMW1Cw5W9EsS+b6KR5+IVLRIb:yUrtDVCWLUzW6aBPFAAb6w5KLAi
Threatray 360 similar samples on MalwareBazaar
TLSH 62561240D5C9A8A9C1161032983DB53938D9F69BD27BCC9FEB1C270560BE3D2E16BE4D
Reporter zbetcheckin
Tags:32 exe ServHelper

Intelligence


File Origin
# of uploads :
2
# of downloads :
1'385
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0533044b6e65dbe2c84f78e43a37a0a0
Verdict:
Suspicious activity
Analysis date:
2021-06-26 19:20:51 UTC
Tags:
autoit

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
80 / 100
Signature
Bypasses PowerShell execution policy
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Obfuscated command line found
Sigma detected: Suspicious Csc.exe Source File Folder
Submitted sample is a known malware sample
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected Costura Assembly Loader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 440902 Sample: kQr9FGofJa Startdate: 26/06/2021 Architecture: WINDOWS Score: 80 57 raw.githubusercontent.com 2->57 59 asdjausg.cn 2->59 75 Multi AV Scanner detection for submitted file 2->75 77 Sigma detected: Suspicious Csc.exe Source File Folder 2->77 79 Yara detected Costura Assembly Loader 2->79 14 kQr9FGofJa.exe 7 2->14         started        signatures3 process4 process5 16 cmd.exe 1 14->16         started        signatures6 63 Submitted sample is a known malware sample 16->63 65 Obfuscated command line found 16->65 67 Uses ping.exe to sleep 16->67 69 Uses ping.exe to check the status of other devices and networks 16->69 19 cmd.exe 3 16->19         started        22 conhost.exe 16->22         started        process7 signatures8 81 Obfuscated command line found 19->81 83 Uses ping.exe to sleep 19->83 24 Sua.exe.com 19->24         started        27 PING.EXE 1 19->27         started        30 findstr.exe 1 19->30         started        process9 dnsIp10 85 Bypasses PowerShell execution policy 24->85 33 Sua.exe.com 24->33         started        61 127.0.0.1 unknown unknown 27->61 53 C:\Users\user\AppData\Local\...\Sua.exe.com, Targa 30->53 dropped file11 signatures12 process13 dnsIp14 55 YSpxeTiSBJemVMg.YSpxeTiSBJemVMg 33->55 71 Modifies the context of a thread in another process (thread injection) 33->71 73 Injects a PE file into a foreign processes 33->73 37 Sua.exe.com 4 33->37         started        signatures15 process16 process17 39 powershell.exe 27 37->39         started        file18 49 C:\Users\user\AppData\...\pqfzwvki.cmdline, UTF-8 39->49 dropped 42 csc.exe 39->42         started        45 conhost.exe 39->45         started        process19 file20 51 C:\Users\user\AppData\Local\...\pqfzwvki.dll, PE32 42->51 dropped 47 cvtres.exe 42->47         started        process21
Threat name:
Win32.Trojan.Crypzip
Status:
Malicious
First seen:
2021-06-26 19:18:11 UTC
AV detection:
9 of 29 (31.03%)
Threat level:
  5/5
Result
Malware family:
servhelper
Score:
  10/10
Tags:
family:servhelper backdoor discovery exploit persistence trojan upx
Behaviour
Modifies data under HKEY_USERS
Modifies registry key
Runs net.exe
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Deletes itself
Loads dropped DLL
Modifies file permissions
Blocklisted process makes network request
Executes dropped EXE
Modifies RDP port number used by Windows
Possible privilege escalation attempt
Sets DLL path for service in the registry
UPX packed file
Grants admin privileges
ServHelper
Malware Config
Dropper Extraction:
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Unpacked files
SH256 hash:
57bd1d7a3ce9a10797575f75af56a675b3739ab5901e383a7870b17fa328ecb4
MD5 hash:
0533044b6e65dbe2c84f78e43a37a0a0
SHA1 hash:
0513796322ed3364335eb9c47faad3324ff162fc
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ServHelper

Executable exe 57bd1d7a3ce9a10797575f75af56a675b3739ab5901e383a7870b17fa328ecb4

(this sample)

  
Delivery method
Distributed via web download

Comments