General
-
Target
3142d3d70a3cf61573d27d759087dfbef92a102ed37f8c6c15c348df19a55339.exe
-
Size
4.9MB
-
Sample
240613-yp4z7sygkf
-
MD5
a0beeee56cf28926d870b5b4c11bd74d
-
SHA1
97046dd1c0581f774179be4abfa5e337f848b20c
-
SHA256
3142d3d70a3cf61573d27d759087dfbef92a102ed37f8c6c15c348df19a55339
-
SHA512
07e916601ac31b914cede30130500032ef380120c18a97a5f32bbd7bd40992f5c151ded1fb1bda43913248c4e4ea7eec9673c361dfd6ec972299d659b98b5a7c
-
SSDEEP
98304:m1Tl9IFMASPUrPJwXax8bFbmyRvpCrvEdwlXfRdAITlfhln24LOMzG9jv4kOFCe:2TcFM78qkAFbvVdqPR+ITlfrdSMa9jv0
Static task
static1
Behavioral task
behavioral1
Sample
3142d3d70a3cf61573d27d759087dfbef92a102ed37f8c6c15c348df19a55339.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3142d3d70a3cf61573d27d759087dfbef92a102ed37f8c6c15c348df19a55339.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
socks5systemz
buustyp.com
bmyhpzj.com
Targets
-
-
Target
3142d3d70a3cf61573d27d759087dfbef92a102ed37f8c6c15c348df19a55339.exe
-
Size
4.9MB
-
MD5
a0beeee56cf28926d870b5b4c11bd74d
-
SHA1
97046dd1c0581f774179be4abfa5e337f848b20c
-
SHA256
3142d3d70a3cf61573d27d759087dfbef92a102ed37f8c6c15c348df19a55339
-
SHA512
07e916601ac31b914cede30130500032ef380120c18a97a5f32bbd7bd40992f5c151ded1fb1bda43913248c4e4ea7eec9673c361dfd6ec972299d659b98b5a7c
-
SSDEEP
98304:m1Tl9IFMASPUrPJwXax8bFbmyRvpCrvEdwlXfRdAITlfhln24LOMzG9jv4kOFCe:2TcFM78qkAFbvVdqPR+ITlfrdSMa9jv0
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-