General
-
Target
b12cb43ed2dfc46d9b443d85703082900322d83bd2704bfa3044b39fe05710b0
-
Size
4.5MB
-
Sample
240530-3czl6seh33
-
MD5
9e7e2d6b9513b32ac5d0336079a5a76d
-
SHA1
816a81cb577967fc1e0302bcd547c90da0d08533
-
SHA256
b12cb43ed2dfc46d9b443d85703082900322d83bd2704bfa3044b39fe05710b0
-
SHA512
991c87cd13e91b1266dcc9bdd6dfc867898c67e3c574be8aec8bee2fa97d75ee6c8470dbc880af81214072b099d3d10cfefefb35b7962e7e6c5ffa9a1c259e4b
-
SSDEEP
98304:mXit+6k7+v/Yna/UX4cwYIUGfghCv1FllwLfU4GL:aiI7+X/U/3GVBwLMP
Static task
static1
Behavioral task
behavioral1
Sample
b12cb43ed2dfc46d9b443d85703082900322d83bd2704bfa3044b39fe05710b0.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b12cb43ed2dfc46d9b443d85703082900322d83bd2704bfa3044b39fe05710b0.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
b12cb43ed2dfc46d9b443d85703082900322d83bd2704bfa3044b39fe05710b0
-
Size
4.5MB
-
MD5
9e7e2d6b9513b32ac5d0336079a5a76d
-
SHA1
816a81cb577967fc1e0302bcd547c90da0d08533
-
SHA256
b12cb43ed2dfc46d9b443d85703082900322d83bd2704bfa3044b39fe05710b0
-
SHA512
991c87cd13e91b1266dcc9bdd6dfc867898c67e3c574be8aec8bee2fa97d75ee6c8470dbc880af81214072b099d3d10cfefefb35b7962e7e6c5ffa9a1c259e4b
-
SSDEEP
98304:mXit+6k7+v/Yna/UX4cwYIUGfghCv1FllwLfU4GL:aiI7+X/U/3GVBwLMP
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-