Behavioral task
behavioral1
Sample
f8ee1c5162c78c9ffdbf27268e8d6f0c04351f6e11ffef27afa66fd3fc84978e.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8ee1c5162c78c9ffdbf27268e8d6f0c04351f6e11ffef27afa66fd3fc84978e.dll
Resource
win10v2004-20231215-en
General
-
Target
ca318d63f009bd39e124bc654e14dcc16d28e5e83b239de6b0d16bd9759cc01a.zip
-
Size
422KB
-
MD5
63445b17096ff3c6fd7ec91bd9e2defd
-
SHA1
bb3901bde5f77fbc4145c16c423d8f3ac488a334
-
SHA256
ca318d63f009bd39e124bc654e14dcc16d28e5e83b239de6b0d16bd9759cc01a
-
SHA512
49e65083e7e3b53a1af8125d4c054f3096a9ac814bef26661588c0fd28c95b52a2df1c76bf9314afbc2e548e49d63e4fb29b8399a7269c24bcc3aade643779bf
-
SSDEEP
12288:u51rC2Kg51LydPIOUbP0d/UIVlLbx+3EXiK4:uLrC2KgmPv+sd3rpX54
Malware Config
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule static1/unpack001/f8ee1c5162c78c9ffdbf27268e8d6f0c04351f6e11ffef27afa66fd3fc84978e family_socks5systemz -
Socks5systemz family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f8ee1c5162c78c9ffdbf27268e8d6f0c04351f6e11ffef27afa66fd3fc84978e
Files
-
ca318d63f009bd39e124bc654e14dcc16d28e5e83b239de6b0d16bd9759cc01a.zip.zip
Password: infected
-
f8ee1c5162c78c9ffdbf27268e8d6f0c04351f6e11ffef27afa66fd3fc84978e.dll windows:5 windows x86 arch:x86
eb9d6ffddd190d49eba975e74b68f8b0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
wininet
InternetCloseHandle
InternetOpenA
InternetSetOptionA
InternetReadFile
InternetOpenUrlA
dnsapi
DnsFree
DnsQuery_A
kernel32
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
VirtualQuery
CreateFileA
lstrlen
TlsGetValue
SetWaitableTimer
InterlockedIncrement
GetQueuedCompletionStatus
InterlockedDecrement
QueryPerformanceCounter
InterlockedCompareExchange
SleepEx
WriteFile
InitializeCriticalSection
TlsSetValue
TerminateThread
InitializeCriticalSectionAndSpinCount
GetTickCount
GetProcessHeap
HeapAlloc
CreateEventA
GetCurrentProcess
HeapFree
WaitForSingleObject
SetEvent
Sleep
GetSystemTimeAsFileTime
LeaveCriticalSection
ReadFile
lstrcat
InterlockedExchange
GetLastError
SetLastError
GetProcAddress
QueueUserAPC
EnterCriticalSection
InterlockedExchangeAdd
LocalAlloc
PostQueuedCompletionStatus
WaitForMultipleObjects
GetModuleFileNameA
CreateIoCompletionPort
GetModuleHandleA
DeleteCriticalSection
GetVersionExA
TlsAlloc
CloseHandle
CreateWaitableTimerA
LocalFree
TlsFree
DeleteFileA
CreateThread
FreeLibrary
LoadLibraryA
DeviceIoControl
HeapSize
GetModuleHandleW
GetModuleFileNameW
SetEndOfFile
CreateFileW
ReadConsoleW
FlushFileBuffers
WriteConsoleW
SetStdHandle
HeapReAlloc
OutputDebugStringW
SetFilePointerEx
LCMapStringW
GetStdHandle
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetFileType
GetConsoleMode
GetConsoleCP
FormatMessageA
OpenEventA
ReleaseSemaphore
GetCurrentProcessId
GetCurrentThreadId
ResetEvent
ResumeThread
EncodePointer
DecodePointer
ExitThread
LoadLibraryExW
GetCommandLineA
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
MultiByteToWideChar
ExitProcess
GetModuleHandleExW
AreFileApisANSI
WideCharToMultiByte
user32
wsprintfA
shell32
SHGetSpecialFolderPathA
ws2_32
ioctlsocket
WSAStringToAddressA
connect
inet_ntoa
WSAStartup
ntohl
inet_addr
ntohl
getaddrinfo
WSARecv
WSASend
select
ntohs
ntohs
getsockname
shutdown
setsockopt
WSACleanup
freeaddrinfo
WSASetLastError
closesocket
getsockopt
WSASocketA
WSAGetLastError
Sections
.text Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 412KB - Virtual size: 412KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE