General
-
Target
ec92fd535000437c1d7c6cf896ea3e9583ac656e5d2953da5cdcbb610dae6dd6
-
Size
5.0MB
-
Sample
240614-kr7l8atbje
-
MD5
8b662840665474400b0b83a5ce5dfba9
-
SHA1
1b7ea182554a8728729cba9f02a8f7a9ac74795a
-
SHA256
ec92fd535000437c1d7c6cf896ea3e9583ac656e5d2953da5cdcbb610dae6dd6
-
SHA512
8226e2d86aa2a59319979c1a1b065544fd363452dd542e308cb3ea1fabeaa6858632f77d1bdb56cc31fe1a7c0b4db049a484b908f3d1e40acb7c526fd0b921c1
-
SSDEEP
98304:m1p3kTW+00NTnsnitaFYrjmyhOG8p8Xbc9CSKHjyqA25ioukkOd42:yua+00dsndFijFhObp8XbcQSWjy25yHC
Static task
static1
Behavioral task
behavioral1
Sample
ec92fd535000437c1d7c6cf896ea3e9583ac656e5d2953da5cdcbb610dae6dd6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
ec92fd535000437c1d7c6cf896ea3e9583ac656e5d2953da5cdcbb610dae6dd6.exe
Resource
win11-20240419-en
Malware Config
Extracted
socks5systemz
boumrbj.com
bggkpuq.com
Targets
-
-
Target
ec92fd535000437c1d7c6cf896ea3e9583ac656e5d2953da5cdcbb610dae6dd6
-
Size
5.0MB
-
MD5
8b662840665474400b0b83a5ce5dfba9
-
SHA1
1b7ea182554a8728729cba9f02a8f7a9ac74795a
-
SHA256
ec92fd535000437c1d7c6cf896ea3e9583ac656e5d2953da5cdcbb610dae6dd6
-
SHA512
8226e2d86aa2a59319979c1a1b065544fd363452dd542e308cb3ea1fabeaa6858632f77d1bdb56cc31fe1a7c0b4db049a484b908f3d1e40acb7c526fd0b921c1
-
SSDEEP
98304:m1p3kTW+00NTnsnitaFYrjmyhOG8p8Xbc9CSKHjyqA25ioukkOd42:yua+00dsndFijFhObp8XbcQSWjy25yHC
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-