ServHelper is a backdoor first observed in late 2018. The backdoor is written in Delphi and is typically delivered as a DLL file.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .010 | 伪装: Masquerade Account Name |
ServHelper has created a new user named |
| Enterprise | T1136 | .001 | 创建账户: Local Account |
ServHelper has created a new user named "supportaccount".[1] |
| Enterprise | T1573 | .002 | 加密通道: Asymmetric Cryptography |
ServHelper may set up a reverse SSH tunnel to give the attacker access to services running on the victim, such as RDP.[1] |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
ServHelper may attempt to establish persistence via the |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
ServHelper has the ability to execute a PowerShell script to get information from the infected host.[3] |
| .003 | 命令与脚本解释器: Windows Command Shell |
ServHelper can execute shell commands against cmd.[1][2] |
||
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
ServHelper uses HTTP for C2.[1] |
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
ServHelper has a module to delete itself from the infected machine.[1][2] |
| Enterprise | T1218 | .011 | 系统二进制代理执行: Rundll32 |
ServHelper contains a module for downloading and executing DLLs that leverages |
| Enterprise | T1082 | 系统信息发现 |
ServHelper will attempt to enumerate Windows version and system architecture.[1] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
ServHelper will attempt to enumerate the username of the victim.[1] |
|
| Enterprise | T1098 | .007 | 账号操控: Additional Local or Domain Groups |
ServHelper has added a user named "supportaccount" to the Remote Desktop Users and Administrators groups.[1] |
| Enterprise | T1105 | 输入工具传输 |
ServHelper may download additional files to execute.[1][2] |
|
| Enterprise | T1021 | .001 | 远程服务: Remote Desktop Protocol |
ServHelper has commands for adding a remote desktop user and sending RDP traffic to the attacker through a reverse SSH tunnel.[1] |
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
ServHelper contains modules that will use schtasks to carry out malicious operations.[1] |