General
-
Target
499ffbd3b9de920c56d02a330be136c49203e6b9f226398a006be470eda8ce0d
-
Size
3.4MB
-
Sample
240204-d7673aahbq
-
MD5
592a701bc4892547ef1a96a6336548de
-
SHA1
b9cf102da3627d412154736f09f8ecfac42a59fd
-
SHA256
499ffbd3b9de920c56d02a330be136c49203e6b9f226398a006be470eda8ce0d
-
SHA512
c1a9ab4c6fb2b55ce0f4dd215539203952ceb52370acbe969f846eb58c7fe44305d454cda7008e1f793ffc3af074ed009a4adaef3ef547b1b3b6e25ba9d86bd4
-
SSDEEP
98304:cjBf676DpowCfpV48epyfqhhYW/8ZEflpvEvCYjxlE:6fA6FowCfrMpyMR8ZEflaqYjxu
Static task
static1
Behavioral task
behavioral1
Sample
499ffbd3b9de920c56d02a330be136c49203e6b9f226398a006be470eda8ce0d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
499ffbd3b9de920c56d02a330be136c49203e6b9f226398a006be470eda8ce0d.exe
Resource
win10-20231215-en
Malware Config
Extracted
socks5systemz
-
rc4_key
i4hiea56#7b&dfw3
Targets
-
-
Target
499ffbd3b9de920c56d02a330be136c49203e6b9f226398a006be470eda8ce0d
-
Size
3.4MB
-
MD5
592a701bc4892547ef1a96a6336548de
-
SHA1
b9cf102da3627d412154736f09f8ecfac42a59fd
-
SHA256
499ffbd3b9de920c56d02a330be136c49203e6b9f226398a006be470eda8ce0d
-
SHA512
c1a9ab4c6fb2b55ce0f4dd215539203952ceb52370acbe969f846eb58c7fe44305d454cda7008e1f793ffc3af074ed009a4adaef3ef547b1b3b6e25ba9d86bd4
-
SSDEEP
98304:cjBf676DpowCfpV48epyfqhhYW/8ZEflpvEvCYjxlE:6fA6FowCfrMpyMR8ZEflaqYjxu
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-