General
-
Target
982dc81b3bea79a2f5701e2746985e5598a849c805600edf2dc09edc1a8b5f41
-
Size
3.4MB
-
Sample
240204-eeattsghc8
-
MD5
d7a57f96714c5ce194d396ba6267acbb
-
SHA1
7bd55b3ee4727c20d726789fd2a5de08a589d80a
-
SHA256
982dc81b3bea79a2f5701e2746985e5598a849c805600edf2dc09edc1a8b5f41
-
SHA512
0dc547b9c20b86875861da3b570b9258aae6194c73b383890dc4611e89540a3c9ac29cd23fbbb646e9ae7b4b94bc79c6dfd0724c23c4273638286d68b8192613
-
SSDEEP
49152:V2L8YwQEKyVkFlt3XsAwApxjhMbDIArorewT38nq5YYAexgUQht/yr9Bd9opIzKw:QHHyVAldsAjLjhi8hNTUsBI6hB2KSC9d
Static task
static1
Behavioral task
behavioral1
Sample
982dc81b3bea79a2f5701e2746985e5598a849c805600edf2dc09edc1a8b5f41.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
982dc81b3bea79a2f5701e2746985e5598a849c805600edf2dc09edc1a8b5f41.exe
Resource
win10-20231215-en
Malware Config
Extracted
socks5systemz
-
rc4_key
i4hiea56#7b&dfw3
Targets
-
-
Target
982dc81b3bea79a2f5701e2746985e5598a849c805600edf2dc09edc1a8b5f41
-
Size
3.4MB
-
MD5
d7a57f96714c5ce194d396ba6267acbb
-
SHA1
7bd55b3ee4727c20d726789fd2a5de08a589d80a
-
SHA256
982dc81b3bea79a2f5701e2746985e5598a849c805600edf2dc09edc1a8b5f41
-
SHA512
0dc547b9c20b86875861da3b570b9258aae6194c73b383890dc4611e89540a3c9ac29cd23fbbb646e9ae7b4b94bc79c6dfd0724c23c4273638286d68b8192613
-
SSDEEP
49152:V2L8YwQEKyVkFlt3XsAwApxjhMbDIArorewT38nq5YYAexgUQht/yr9Bd9opIzKw:QHHyVAldsAjLjhi8hNTUsBI6hB2KSC9d
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-