ServHelper
Description
ServHelper is written in Delphi and according to ProofPoint best classified as a backdoor.
ProofPoint noticed two distinct variant - ‘tunnel’ and ‘downloader’ (citation): ‘The ‘tunnel’ variant has more features and focuses on setting up reverse SSH tunnels to allow the threat actor to access the infected host via Remote Desktop Protocol (RDP). Once ServHelper establishes remote desktop access, the malware contains functionality for the threat actor to ‘hijack’ legitimate user accounts or their web browser profiles and use them as they see fit. The ‘downloader’ variant is stripped of the tunneling and hijacking functionality and is used as a basic downloader.‘
Names
Name |
---|
ServHelper |
Category
Malware
Type
- Backdoor
- Credential stealer
- Downloader
Information
- https://www.proofpoint.com/us/threat-insight/post/servhelper-and-flawedgrace-new-malware-introduced-ta505
- https://e.cyberint.com/hubfs/Report%20Legit%20Remote%20Access%20Tools%20Turn%20Into%20Threat%20Actors%20Tools/CyberInt_Legit%20Remote%20Access%20Tools%20Turn%20Into%20Threat%20Actors’%20Tools_Report.pdf
- https://www.deepinstinct.com/2019/04/02/new-servhelper-variant-employs-excel-4-0-macro-to-drop-signed-payload/
- https://ti.360.net/blog/articles/excel-4.0-macro-utilized-by-ta505-to-target-financial-institutions-recently-en/
- https://www.cybereason.com/blog/threat-actor-ta505-targets-financial-enterprises-using-lolbins-and-a-new-backdoor-malware
Mitre Attack
Malpedia
Other Information
Uuid
8e84ad65-ea4e-40a0-9598-e3a8402c012c
Last Card Change
2020-05-14