General
-
Target
bb252f53b5d4add6546fc3fe384ff6cdf7e9f9750aac203c32e698b67c06256d
-
Size
5.6MB
-
Sample
240615-xsl35a1hrg
-
MD5
2dcb104a49188a97c0019dd14ad42cd7
-
SHA1
3d9189056d8ebecfe03f6f052cdaa440457bad85
-
SHA256
bb252f53b5d4add6546fc3fe384ff6cdf7e9f9750aac203c32e698b67c06256d
-
SHA512
04875dca31b271928fb6f9f632f755f4c80b65b041a472720aabd83006239d66b399a6c46302ae2ac73465112062066545836b8220d087badc83be8253df0ea6
-
SSDEEP
98304:meAs7YA9t2hexYzbI8uMo5sykecbcvFukCs9d0VCrc/LNg+MQOb+F8hJdj0/v+:P94iYfI66PVvF2sTA/L9Zc1hJ10H+
Static task
static1
Behavioral task
behavioral1
Sample
bb252f53b5d4add6546fc3fe384ff6cdf7e9f9750aac203c32e698b67c06256d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
bb252f53b5d4add6546fc3fe384ff6cdf7e9f9750aac203c32e698b67c06256d.exe
Resource
win11-20240419-en
Malware Config
Extracted
socks5systemz
buxelie.com
aiucvds.ru
Targets
-
-
Target
bb252f53b5d4add6546fc3fe384ff6cdf7e9f9750aac203c32e698b67c06256d
-
Size
5.6MB
-
MD5
2dcb104a49188a97c0019dd14ad42cd7
-
SHA1
3d9189056d8ebecfe03f6f052cdaa440457bad85
-
SHA256
bb252f53b5d4add6546fc3fe384ff6cdf7e9f9750aac203c32e698b67c06256d
-
SHA512
04875dca31b271928fb6f9f632f755f4c80b65b041a472720aabd83006239d66b399a6c46302ae2ac73465112062066545836b8220d087badc83be8253df0ea6
-
SSDEEP
98304:meAs7YA9t2hexYzbI8uMo5sykecbcvFukCs9d0VCrc/LNg+MQOb+F8hJdj0/v+:P94iYfI66PVvF2sTA/L9Zc1hJ10H+
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-