General
-
Target
3885e17b0c2f45a5790d2ee1e1b2c06f29b03340f22e93f27ef3590330fc7153
-
Size
5.9MB
-
Sample
240617-cn5z8azcnb
-
MD5
3107fd150626df8695083fe63b449f19
-
SHA1
d9bb65833dd3fffd49dff8fbb800282a24329162
-
SHA256
3885e17b0c2f45a5790d2ee1e1b2c06f29b03340f22e93f27ef3590330fc7153
-
SHA512
c1dd662aca77015694ca7c8eb8e7e045606a4954de6367801188001789d321cdd3c5a8db21f5d3965e05004f25cdbebad2b47b513cc34513c6b721b783466808
-
SSDEEP
98304:mV/HmIUFN6ip/jqIFQNYp082I9uwE4Ox9C889LM9DL8z/D6VyHgdcG0fo2mk3xS:Q/G7FNxrmNiS54RI8z/THgdanmk3c
Static task
static1
Behavioral task
behavioral1
Sample
3885e17b0c2f45a5790d2ee1e1b2c06f29b03340f22e93f27ef3590330fc7153.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
3885e17b0c2f45a5790d2ee1e1b2c06f29b03340f22e93f27ef3590330fc7153.exe
Resource
win11-20240508-en
Malware Config
Extracted
socks5systemz
dlcgyte.info
ceoefkk.net
Targets
-
-
Target
3885e17b0c2f45a5790d2ee1e1b2c06f29b03340f22e93f27ef3590330fc7153
-
Size
5.9MB
-
MD5
3107fd150626df8695083fe63b449f19
-
SHA1
d9bb65833dd3fffd49dff8fbb800282a24329162
-
SHA256
3885e17b0c2f45a5790d2ee1e1b2c06f29b03340f22e93f27ef3590330fc7153
-
SHA512
c1dd662aca77015694ca7c8eb8e7e045606a4954de6367801188001789d321cdd3c5a8db21f5d3965e05004f25cdbebad2b47b513cc34513c6b721b783466808
-
SSDEEP
98304:mV/HmIUFN6ip/jqIFQNYp082I9uwE4Ox9C889LM9DL8z/D6VyHgdcG0fo2mk3xS:Q/G7FNxrmNiS54RI8z/THgdanmk3c
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-