General
-
Target
8fe9ec621008b29e7c47a4a2fc492d28.bin
-
Size
2.0MB
-
Sample
240325-dqhs5she9w
-
MD5
bb753b1c0fe3ecbf83b82136f0405e0f
-
SHA1
9f1cad16113308246d8b47b8e3534837f2450302
-
SHA256
a96c13cc4a2def1f6b62789c8c63da8ae11f4d83dff558a46fb5dfd8f4a581dd
-
SHA512
5743f268a46993ed28fc824ef76293458be52c1b9e88aa1fac0da91323d3592c4c54c207c6b2cc36f8676be864033267005e1774f91c73d5b6513aa7c55c1466
-
SSDEEP
49152:hHmJ5QC1Us2CPRwsmH96GF04t11afc2sayfuxT:9mJ5D1UvwTXGHt11CcyLl
Static task
static1
Behavioral task
behavioral1
Sample
a7a7a60fa640fc9a4dbdbac52b68a1774bb159b99c179df650c9f41fd4d20a6a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a7a7a60fa640fc9a4dbdbac52b68a1774bb159b99c179df650c9f41fd4d20a6a.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
socks5systemz
http://bujubwn.com/search/?q=67e28dd83f0bf1291606a9177c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978f171ea771795af8e05c645db22f31df92d8b38e316a667d307eca743ec4c2b07b52966923a668dfc17c4ed91
http://bujubwn.com/search/?q=67e28dd83f0bf1291606a9177c27d78406abdd88be4b12eab517aa5c96bd86e99d824a815a8bbc896c58e713bc90c91836b5281fc235a925ed3e52d6bd974a95129070b616e96cc92be20ea778c255bbe258b90d3b4eed3233d1626a8ff810c1ec969c3fcf6b
http://dleeqkm.info/search/?q=67e28dd86a5cf47e155fff1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978ff71ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ffe12c3e991983f
http://dleeqkm.info/search/?q=67e28dd86a5cf47e155fff1a7c27d78406abdd88be4b12eab517aa5c96bd86e993854f885a8bbc896c58e713bc90c91836b5281fc235a925ed3e5cd6bd974a95129070b616e96cc92be510b866db52b2e34aec4c2b14a82966836f23d7f210c7ee949938cb6b9412
Targets
-
-
Target
a7a7a60fa640fc9a4dbdbac52b68a1774bb159b99c179df650c9f41fd4d20a6a.exe
-
Size
2.0MB
-
MD5
8fe9ec621008b29e7c47a4a2fc492d28
-
SHA1
f8930f4037b081f0c54b00f0d1e93d936a7af669
-
SHA256
a7a7a60fa640fc9a4dbdbac52b68a1774bb159b99c179df650c9f41fd4d20a6a
-
SHA512
2eb25f96e289fee6ad2f70710c39b27c30db889f683a24a4592c47862cfeec84f2c25dacc73d267897f67dc3ec212de4065e0c2719188bc01aaded9af7512b41
-
SSDEEP
49152:32dOY3q2cSnjXhVR5ZbNk6tpebYwyq0yRa2pQroFa98:m93F1jTR5Z7uM5LkGroFa6
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-