General
-
Target
5513ae93920fa055815a4d2c8e1559cf7c88fc352dbcde084ca666285beb101d.exe
-
Size
4.8MB
-
Sample
240613-bne85ayenf
-
MD5
2e5fc69b5e509351e5fab26819124385
-
SHA1
7ec21ee1ed9b76690a1376cead4f6277d31aa3f7
-
SHA256
5513ae93920fa055815a4d2c8e1559cf7c88fc352dbcde084ca666285beb101d
-
SHA512
3dd90880283c7ffd7bb83b721f15bdd146711feab4c03acaf0678aa0d20c2efa86fb7d0bf585b1b9a1a9e217b39cc992f91562e726671c1e45eac907da447923
-
SSDEEP
98304:mQZcNl5ewg+OOdoMLSmhtqodzKi1hm2YdjztF7W4Ipw:PyUwXAmesEzb6pw
Static task
static1
Behavioral task
behavioral1
Sample
5513ae93920fa055815a4d2c8e1559cf7c88fc352dbcde084ca666285beb101d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5513ae93920fa055815a4d2c8e1559cf7c88fc352dbcde084ca666285beb101d.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
socks5systemz
boixvls.com
ckeakos.net
http://ckeakos.net/search/?q=67e28dd83954f07a4008f8497c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ae8889b5e4fa9281ae978ff71ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ff713c4ee91933e
Targets
-
-
Target
5513ae93920fa055815a4d2c8e1559cf7c88fc352dbcde084ca666285beb101d.exe
-
Size
4.8MB
-
MD5
2e5fc69b5e509351e5fab26819124385
-
SHA1
7ec21ee1ed9b76690a1376cead4f6277d31aa3f7
-
SHA256
5513ae93920fa055815a4d2c8e1559cf7c88fc352dbcde084ca666285beb101d
-
SHA512
3dd90880283c7ffd7bb83b721f15bdd146711feab4c03acaf0678aa0d20c2efa86fb7d0bf585b1b9a1a9e217b39cc992f91562e726671c1e45eac907da447923
-
SSDEEP
98304:mQZcNl5ewg+OOdoMLSmhtqodzKi1hm2YdjztF7W4Ipw:PyUwXAmesEzb6pw
Score10/10-
Detect Socks5Systemz Payload
-
Detects executables packed with VMProtect.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-