General
-
Target
7d661992e881431b0bfe2b95f44a509c790ae0330c1c0cc7446ab0a707ea7876
-
Size
8.0MB
-
Sample
231211-fpd5nsehf7
-
MD5
fd7f0fbf9e8e5fce5356d5751ef21d68
-
SHA1
383ce87147caee8793ed6b923a8587d96682a06c
-
SHA256
7d661992e881431b0bfe2b95f44a509c790ae0330c1c0cc7446ab0a707ea7876
-
SHA512
e6688fcafd3c271319e2a6dac2c7523d9f497fe04e63c0710d45e10a9f94c74a867ac8d4af83b78348a5312b2f9eb3eb8a5729f099560cd33567c0375ca62636
-
SSDEEP
196608:G4lBu+BpMBvbZVlSloOBs8Awr2wI2CqPb4oMvTwaqd:ChPvMVsDv0v
Static task
static1
Behavioral task
behavioral1
Sample
7d661992e881431b0bfe2b95f44a509c790ae0330c1c0cc7446ab0a707ea7876.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
7d661992e881431b0bfe2b95f44a509c790ae0330c1c0cc7446ab0a707ea7876.exe
Resource
win10-20231023-en
Malware Config
Extracted
socks5systemz
-
rc4_key
i4hiea56#7b&dfw3
Targets
-
-
Target
7d661992e881431b0bfe2b95f44a509c790ae0330c1c0cc7446ab0a707ea7876
-
Size
8.0MB
-
MD5
fd7f0fbf9e8e5fce5356d5751ef21d68
-
SHA1
383ce87147caee8793ed6b923a8587d96682a06c
-
SHA256
7d661992e881431b0bfe2b95f44a509c790ae0330c1c0cc7446ab0a707ea7876
-
SHA512
e6688fcafd3c271319e2a6dac2c7523d9f497fe04e63c0710d45e10a9f94c74a867ac8d4af83b78348a5312b2f9eb3eb8a5729f099560cd33567c0375ca62636
-
SSDEEP
196608:G4lBu+BpMBvbZVlSloOBs8Awr2wI2CqPb4oMvTwaqd:ChPvMVsDv0v
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-