MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f18e085889d9d7324c57ecb800563ba2e808c0ef8ad52b7b1f1f3afa169bf836. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ServHelper


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: f18e085889d9d7324c57ecb800563ba2e808c0ef8ad52b7b1f1f3afa169bf836
SHA3-384 hash: 00f37eedfceb3ab320c47689d45568f9d31af9cbfe78f11fab11e40cec4952eb049222b44e970f71d85773b826f62b20
SHA1 hash: 2e783c279542ea1708854413a0cd725184f8fa78
MD5 hash: 7a383f57f7d2190d9af3e57d67cfb004
humanhash: nevada-magnesium-saturn-march
File name:7a383f57f7d2190d9af3e57d67cfb004
Download: download sample
Signature ServHelper
File size:7'280'774 bytes
First seen:2021-06-11 14:55:15 UTC
Last seen:2021-06-11 15:49:05 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 011a034751880c1944da3b5ecc18520d (8 x RedLineStealer, 4 x CryptBot, 3 x ArkeiStealer)
ssdeep 196608:vNLptmMAAoPyqO+L//02LCDMnruqDAZIwIPXn6T:vRSz//CAnrupIw2XC
Threatray 185 similar samples on MalwareBazaar
TLSH 53763375BEFDAAB9D27108361DE1D3B83A57BE52832D85C226E04867FE20481D37D1C9
Reporter zbetcheckin
Tags:exe ServHelper

Intelligence


File Origin
# of uploads :
2
# of downloads :
1'409
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
7a383f57f7d2190d9af3e57d67cfb004
Verdict:
Suspicious activity
Analysis date:
2021-06-11 15:03:59 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Creating a process from a recently created file
Deleting a recently created file
DNS request
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
84 / 100
Signature
Bypasses PowerShell execution policy
Contains functionality to register a low level keyboard hook
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Obfuscated command line found
Sigma detected: Suspicious Csc.exe Source File Folder
Submitted sample is a known malware sample
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected Costura Assembly Loader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 433342 Sample: L84BI0slBa Startdate: 11/06/2021 Architecture: WINDOWS Score: 84 60 raw.githubusercontent.com 2->60 62 asdjausg.cn 2->62 76 Multi AV Scanner detection for submitted file 2->76 78 Sigma detected: Suspicious Csc.exe Source File Folder 2->78 80 Yara detected Costura Assembly Loader 2->80 14 L84BI0slBa.exe 7 2->14         started        signatures3 process4 signatures5 92 Contains functionality to register a low level keyboard hook 14->92 17 cmd.exe 1 14->17         started        process6 signatures7 68 Submitted sample is a known malware sample 17->68 70 Obfuscated command line found 17->70 72 Uses ping.exe to sleep 17->72 74 Uses ping.exe to check the status of other devices and networks 17->74 20 cmd.exe 3 17->20         started        23 conhost.exe 17->23         started        process8 signatures9 86 Obfuscated command line found 20->86 88 Uses ping.exe to sleep 20->88 25 Vostra.exe.com 20->25         started        28 PING.EXE 1 20->28         started        31 findstr.exe 1 20->31         started        process10 dnsIp11 90 Bypasses PowerShell execution policy 25->90 34 Vostra.exe.com 25->34         started        66 127.0.0.1 unknown unknown 28->66 58 C:\Users\user\AppData\...\Vostra.exe.com, Targa 31->58 dropped file12 signatures13 process14 dnsIp15 64 rhRDHAYtAoQHDCIZfrnmk.rhRDHAYtAoQHDCIZfrnmk 34->64 82 Modifies the context of a thread in another process (thread injection) 34->82 84 Injects a PE file into a foreign processes 34->84 38 Vostra.exe.com 4 34->38         started        signatures16 process17 process18 40 powershell.exe 39 38->40         started        file19 54 C:\Users\user\AppData\...\ykjpuscj.cmdline, UTF-8 40->54 dropped 43 csc.exe 40->43         started        46 powershell.exe 40->46         started        48 conhost.exe 40->48         started        process20 file21 56 C:\Users\user\AppData\Local\...\ykjpuscj.dll, PE32 43->56 dropped 50 cvtres.exe 43->50         started        52 conhost.exe 46->52         started        process22
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2021-06-10 19:32:36 UTC
AV detection:
9 of 29 (31.03%)
Threat level:
  5/5
Result
Malware family:
servhelper
Score:
  10/10
Tags:
family:servhelper backdoor discovery exploit persistence trojan upx
Behaviour
Modifies data under HKEY_USERS
Modifies registry key
Runs net.exe
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Deletes itself
Loads dropped DLL
Modifies file permissions
Blocklisted process makes network request
Executes dropped EXE
Modifies RDP port number used by Windows
Possible privilege escalation attempt
Sets DLL path for service in the registry
UPX packed file
Grants admin privileges
ServHelper
Malware Config
Dropper Extraction:
https://raw.githubusercontent.com/sqlitey/sqlite/master/speed.ps1
Unpacked files
SH256 hash:
f18e085889d9d7324c57ecb800563ba2e808c0ef8ad52b7b1f1f3afa169bf836
MD5 hash:
7a383f57f7d2190d9af3e57d67cfb004
SHA1 hash:
2e783c279542ea1708854413a0cd725184f8fa78
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ServHelper

Executable exe f18e085889d9d7324c57ecb800563ba2e808c0ef8ad52b7b1f1f3afa169bf836

(this sample)

  
Delivery method
Distributed via web download

Comments