General
-
Target
02a6c3550d8621e3b29a5deaa58ab90a5bb559796a7d94baccb92ffdd5fa78c2
-
Size
7.8MB
-
Sample
231210-17h7kafab5
-
MD5
6c26267552a2bfff3a4ffba3ef0b8241
-
SHA1
ff26cbcee3e00bd4e633229a89707dd31def6858
-
SHA256
02a6c3550d8621e3b29a5deaa58ab90a5bb559796a7d94baccb92ffdd5fa78c2
-
SHA512
924c1aed45f9d52bffdaa820744a2b5fc2a54cee21cea93026ecc1b3feac386c1755ee39522584fe808d318c5e993b960c7bce738dad1aa9a64dbaae2aa6e419
-
SSDEEP
98304:2WQE2Gy2qRt4v6DaIJYcDj8li3+Qhwy00q7HelOkNdJrGIFEYriWcr+r06XxkC07:EzBXRQKaAT3Vk0nf2Iy+ixq0DBzf44bd
Static task
static1
Behavioral task
behavioral1
Sample
02a6c3550d8621e3b29a5deaa58ab90a5bb559796a7d94baccb92ffdd5fa78c2.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
02a6c3550d8621e3b29a5deaa58ab90a5bb559796a7d94baccb92ffdd5fa78c2.exe
Resource
win10-20231129-en
Malware Config
Extracted
socks5systemz
-
rc4_key
i4hiea56#7b&dfw3
Targets
-
-
Target
02a6c3550d8621e3b29a5deaa58ab90a5bb559796a7d94baccb92ffdd5fa78c2
-
Size
7.8MB
-
MD5
6c26267552a2bfff3a4ffba3ef0b8241
-
SHA1
ff26cbcee3e00bd4e633229a89707dd31def6858
-
SHA256
02a6c3550d8621e3b29a5deaa58ab90a5bb559796a7d94baccb92ffdd5fa78c2
-
SHA512
924c1aed45f9d52bffdaa820744a2b5fc2a54cee21cea93026ecc1b3feac386c1755ee39522584fe808d318c5e993b960c7bce738dad1aa9a64dbaae2aa6e419
-
SSDEEP
98304:2WQE2Gy2qRt4v6DaIJYcDj8li3+Qhwy00q7HelOkNdJrGIFEYriWcr+r06XxkC07:EzBXRQKaAT3Vk0nf2Iy+ixq0DBzf44bd
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-