General
-
Target
dd17f874ceb2b4a7f755e42419f9e72c45063a4f4ba13c1209e32a342fd86d39
-
Size
5.0MB
-
Sample
240614-aa131awgpa
-
MD5
fc305092defe1f2e2c1b3cd9e99c4860
-
SHA1
d3e4c502bef44d6ae0caeb44b903baff34c453b6
-
SHA256
dd17f874ceb2b4a7f755e42419f9e72c45063a4f4ba13c1209e32a342fd86d39
-
SHA512
65f9294bfb42b10cbfa9be1f68e09a31fb4dbc29937a9b327e59c375f9123856a318ca9db7d9b00388fe0752434014b1db84b2d588df5f35bcbf09ae18a49f2f
-
SSDEEP
98304:mImXN+SJO6lnQlIPWsMt0g+Ocyrvh1VhDmP6Aowv7twhDtZqhHpm1ZIvBHO9doM8:m9+SJO6lnQlIPWsRODrJ1V4vlmXqhpce
Static task
static1
Behavioral task
behavioral1
Sample
dd17f874ceb2b4a7f755e42419f9e72c45063a4f4ba13c1209e32a342fd86d39.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
dd17f874ceb2b4a7f755e42419f9e72c45063a4f4ba13c1209e32a342fd86d39.exe
Resource
win10-20240404-en
Malware Config
Extracted
socks5systemz
cklbbri.net
gbxdvcf.com
ddhuguz.info
http://ddhuguz.info/search/?q=67e28dd8685af379125bfd4e7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa49e8889b5e4fa9281ae978f271ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ff712c2ec969e3e
Targets
-
-
Target
dd17f874ceb2b4a7f755e42419f9e72c45063a4f4ba13c1209e32a342fd86d39
-
Size
5.0MB
-
MD5
fc305092defe1f2e2c1b3cd9e99c4860
-
SHA1
d3e4c502bef44d6ae0caeb44b903baff34c453b6
-
SHA256
dd17f874ceb2b4a7f755e42419f9e72c45063a4f4ba13c1209e32a342fd86d39
-
SHA512
65f9294bfb42b10cbfa9be1f68e09a31fb4dbc29937a9b327e59c375f9123856a318ca9db7d9b00388fe0752434014b1db84b2d588df5f35bcbf09ae18a49f2f
-
SSDEEP
98304:mImXN+SJO6lnQlIPWsMt0g+Ocyrvh1VhDmP6Aowv7twhDtZqhHpm1ZIvBHO9doM8:m9+SJO6lnQlIPWsRODrJ1V4vlmXqhpce
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-