General
-
Target
04dba6650f1df62c90a0429da3e29f07e2841bacb6aa05523587dcabd5a154bf
-
Size
5.9MB
-
Sample
240616-zzp5gasbkk
-
MD5
0600fe000862c4f318a806498f0a9599
-
SHA1
c153720b3af003112d489c96376058241a2cb76d
-
SHA256
04dba6650f1df62c90a0429da3e29f07e2841bacb6aa05523587dcabd5a154bf
-
SHA512
18b6dff6dce0e0e0cc5d6214ca6d4c005ffc29e37eb37770ca67c2c86625c45db5d15a799e85f89bc217322cad6d3a7dd6eff8a4b006730b0747e9c137b1dd03
-
SSDEEP
98304:mPUqgG0JxABuSb4s8jxNnn8wln+IDrvcKG6kMwHHQMtdH2ZO:MUc0JxABFc8wllrvcKG6k7w0dUO
Static task
static1
Behavioral task
behavioral1
Sample
04dba6650f1df62c90a0429da3e29f07e2841bacb6aa05523587dcabd5a154bf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
04dba6650f1df62c90a0429da3e29f07e2841bacb6aa05523587dcabd5a154bf.exe
Resource
win11-20240508-en
Malware Config
Extracted
socks5systemz
ayuclgo.ru
ccldufp.net
Targets
-
-
Target
04dba6650f1df62c90a0429da3e29f07e2841bacb6aa05523587dcabd5a154bf
-
Size
5.9MB
-
MD5
0600fe000862c4f318a806498f0a9599
-
SHA1
c153720b3af003112d489c96376058241a2cb76d
-
SHA256
04dba6650f1df62c90a0429da3e29f07e2841bacb6aa05523587dcabd5a154bf
-
SHA512
18b6dff6dce0e0e0cc5d6214ca6d4c005ffc29e37eb37770ca67c2c86625c45db5d15a799e85f89bc217322cad6d3a7dd6eff8a4b006730b0747e9c137b1dd03
-
SSDEEP
98304:mPUqgG0JxABuSb4s8jxNnn8wln+IDrvcKG6kMwHHQMtdH2ZO:MUc0JxABFc8wllrvcKG6k7w0dUO
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-