General
-
Target
ed99bc19ec7d5137cd925f2d2d31aa2b4c4f008ec98b4b9cd8bb9e2910f46e54.exe
-
Size
5.6MB
-
Sample
240615-mrrl4sxeke
-
MD5
ae111c7f6b3e5317ec3e428e7340c357
-
SHA1
71f18c44bc543b6cb5ed792f9430842dc1cf61f5
-
SHA256
ed99bc19ec7d5137cd925f2d2d31aa2b4c4f008ec98b4b9cd8bb9e2910f46e54
-
SHA512
95ba9edf6a8c55045f5840f74bc1a0a245c32a3749878d055de1e9af6c2a6945fae875d49414a3ad8314142d71ec8ec94cdbd3208514c1e7a83c780f4ff37a81
-
SSDEEP
98304:mQTH8zt/yCOLuH/XssxEkfLZZA4dFWku/ndG8Z7+TXYyA56xfr7mevz:pr+tdfXJuk1ZRzumTVm6B7m+
Static task
static1
Behavioral task
behavioral1
Sample
ed99bc19ec7d5137cd925f2d2d31aa2b4c4f008ec98b4b9cd8bb9e2910f46e54.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ed99bc19ec7d5137cd925f2d2d31aa2b4c4f008ec98b4b9cd8bb9e2910f46e54.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
socks5systemz
cctbyon.net
http://cctbyon.net/search/?q=67e28dd86f54a728120ffa1d7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f771ea771795af8e05c645db22f31df92d8b38e316a667d307eca743ec4c2b07b52966923a6f8afb19c2ef94
bbzkdub.com
Targets
-
-
Target
ed99bc19ec7d5137cd925f2d2d31aa2b4c4f008ec98b4b9cd8bb9e2910f46e54.exe
-
Size
5.6MB
-
MD5
ae111c7f6b3e5317ec3e428e7340c357
-
SHA1
71f18c44bc543b6cb5ed792f9430842dc1cf61f5
-
SHA256
ed99bc19ec7d5137cd925f2d2d31aa2b4c4f008ec98b4b9cd8bb9e2910f46e54
-
SHA512
95ba9edf6a8c55045f5840f74bc1a0a245c32a3749878d055de1e9af6c2a6945fae875d49414a3ad8314142d71ec8ec94cdbd3208514c1e7a83c780f4ff37a81
-
SSDEEP
98304:mQTH8zt/yCOLuH/XssxEkfLZZA4dFWku/ndG8Z7+TXYyA56xfr7mevz:pr+tdfXJuk1ZRzumTVm6B7m+
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-