MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ac5df971e605c439d1851391f51ae799b24823c47aea5c0ac177f00e5d4cc1f2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ServHelper


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: ac5df971e605c439d1851391f51ae799b24823c47aea5c0ac177f00e5d4cc1f2
SHA3-384 hash: c1411dea1172feb1fc262350dab91e20604e3f89283ea11152a321e6627615f032665435fbd950d96dbd8fec9d3b43ac
SHA1 hash: 3d48649f085710bc3a086e53e2e9fb9b435e34cc
MD5 hash: c8284ad28e4f8bd853604543884a9438
humanhash: island-five-tennessee-jig
File name:c8284ad28e4f8bd853604543884a9438.exe
Download: download sample
Signature ServHelper
File size:7'435'556 bytes
First seen:2021-07-19 06:27:58 UTC
Last seen:2021-07-19 07:41:01 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash a011f8d93026fd9f5e9442faeeff606d (8 x RedLineStealer, 2 x ModiLoader, 1 x ServHelper)
ssdeep 98304:xxz/xkgybMmnx/ixxdp4cDicJqs6ale2d9yp6jkLZe6POma31Q63pYdLNTiSScDh:xxBe/VKicBeZKK433yLNT5VvtDG6Ff
Threatray 338 similar samples on MalwareBazaar
TLSH T1FE7633517A406D23C458F7328AD6E97C17BEAFDB680B594EF398EE0D91202A5131F3C6
Reporter abuse_ch
Tags:exe ServHelper

Intelligence


File Origin
# of uploads :
2
# of downloads :
1'347
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
c8284ad28e4f8bd853604543884a9438.exe
Verdict:
Suspicious activity
Analysis date:
2021-07-19 06:29:25 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
SERVHELPER
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Bypasses PowerShell execution policy
Contains functionality to register a low level keyboard hook
Contains functionality to start a terminal service
Detected SERVHELPER
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Obfuscated command line found
Performs DNS queries to domains with low reputation
Sigma detected: Suspicious Script Execution From Temp Folder
Submitted sample is a known malware sample
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected Costura Assembly Loader
Yara detected Powershell dedcode and execute
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 450486 Sample: Zk34itvXv2.exe Startdate: 19/07/2021 Architecture: WINDOWS Score: 100 48 potuybze.xyz 2->48 50 raw.githubusercontent.com 2->50 68 Multi AV Scanner detection for submitted file 2->68 70 Yara detected Powershell dedcode and execute 2->70 72 Contains functionality to start a terminal service 2->72 74 3 other signatures 2->74 13 Zk34itvXv2.exe 7 2->13         started        signatures3 process4 signatures5 84 Contains functionality to register a low level keyboard hook 13->84 16 cmd.exe 1 13->16         started        process6 signatures7 56 Submitted sample is a known malware sample 16->56 58 Obfuscated command line found 16->58 60 Uses ping.exe to sleep 16->60 62 Uses ping.exe to check the status of other devices and networks 16->62 19 cmd.exe 3 16->19         started        22 conhost.exe 16->22         started        process8 signatures9 76 Obfuscated command line found 19->76 78 Uses ping.exe to sleep 19->78 24 Pel.exe.com 19->24         started        27 PING.EXE 1 19->27         started        30 findstr.exe 1 19->30         started        process10 dnsIp11 82 Bypasses PowerShell execution policy 24->82 33 Pel.exe.com 24->33         started        52 127.0.0.1 unknown unknown 27->52 54 192.168.2.1 unknown unknown 27->54 44 C:\Users\user\AppData\Local\...\Pel.exe.com, Targa 30->44 dropped file12 signatures13 process14 dnsIp15 46 wVoLLIgGqdFuOCdSam.wVoLLIgGqdFuOCdSam 33->46 64 Modifies the context of a thread in another process (thread injection) 33->64 66 Injects a PE file into a foreign processes 33->66 37 Pel.exe.com 4 33->37         started        signatures16 process17 process18 39 powershell.exe 13 37->39         started        signatures19 80 Detected SERVHELPER 39->80 42 conhost.exe 39->42         started        process20
Threat name:
Win32.Trojan.Zusy
Status:
Malicious
First seen:
2021-07-15 01:03:38 UTC
AV detection:
9 of 46 (19.57%)
Threat level:
  5/5
Result
Malware family:
servhelper
Score:
  10/10
Tags:
family:servhelper backdoor discovery exploit persistence trojan upx
Behaviour
Modifies data under HKEY_USERS
Modifies registry key
Runs net.exe
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Deletes itself
Loads dropped DLL
Modifies file permissions
Blocklisted process makes network request
Executes dropped EXE
Modifies RDP port number used by Windows
Possible privilege escalation attempt
Sets DLL path for service in the registry
UPX packed file
Grants admin privileges
ServHelper
Malware Config
Dropper Extraction:
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Unpacked files
SH256 hash:
ac5df971e605c439d1851391f51ae799b24823c47aea5c0ac177f00e5d4cc1f2
MD5 hash:
c8284ad28e4f8bd853604543884a9438
SHA1 hash:
3d48649f085710bc3a086e53e2e9fb9b435e34cc
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments