General
-
Target
06d93c17bc39931ba564b8ff319b56e6.exe
-
Size
2.0MB
-
Sample
240323-gm1rbsec27
-
MD5
06d93c17bc39931ba564b8ff319b56e6
-
SHA1
b03a4d4a514ce4a695a6183031d810082899736b
-
SHA256
c23242b32c4bc6e3ed2fa667c90c953ea830e4078772b8782ece98781748a260
-
SHA512
95b68f9169108ff5385668346a77d945c6336e84f813aa30e558b173f4625bb24fbf2319cb23db5faee5e683935f124ac32ee20d3f0a8b02e6b7b77f3fe96379
-
SSDEEP
49152:32FFgt0uSOSYlzWpwzqigvDrV1Dx7KtUapaB6b:mFkAa/zq9vvXDQtRpaB6b
Static task
static1
Behavioral task
behavioral1
Sample
06d93c17bc39931ba564b8ff319b56e6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
06d93c17bc39931ba564b8ff319b56e6.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
socks5systemz
http://bosiuvj.com/search/?q=67e28dd8395dfb2f495fac1e7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978a771ea771795af8e05c645db22f31df92d8b38e316a667d307eca743ec4c2b07b52966923a668ff812c4ed9c
http://dlsuekw.info/search/?q=67e28dd86a5cf47e155fff1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978ff71ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ffe10c7ec919833
Targets
-
-
Target
06d93c17bc39931ba564b8ff319b56e6.exe
-
Size
2.0MB
-
MD5
06d93c17bc39931ba564b8ff319b56e6
-
SHA1
b03a4d4a514ce4a695a6183031d810082899736b
-
SHA256
c23242b32c4bc6e3ed2fa667c90c953ea830e4078772b8782ece98781748a260
-
SHA512
95b68f9169108ff5385668346a77d945c6336e84f813aa30e558b173f4625bb24fbf2319cb23db5faee5e683935f124ac32ee20d3f0a8b02e6b7b77f3fe96379
-
SSDEEP
49152:32FFgt0uSOSYlzWpwzqigvDrV1Dx7KtUapaB6b:mFkAa/zq9vvXDQtRpaB6b
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-