General
-
Target
193d3b57054d5a6b791995792f232133f7a9d1988834da6736c73a379f88f7b2
-
Size
4.8MB
-
Sample
240617-fnwckazbmm
-
MD5
5618252bc2559b564db89c7c50868bcf
-
SHA1
ff96d364bd5a98a2dc8d29fcc540956298b15a1c
-
SHA256
193d3b57054d5a6b791995792f232133f7a9d1988834da6736c73a379f88f7b2
-
SHA512
6b181e6cafd5352d7915d1e0c0eab123423fce8132cbf2aa6f12a57bf23ec05f0d35a098ec656a590f13a7b40febe74ffb9507ff887f58930f618d319df2d46d
-
SSDEEP
98304:mxO1GDvbTGYhb8QSfJEly4x3AJki9zVfrqs0xIFaA8UG/mZf:mBrGYhEREly4x3CzVfrqsAD1mf
Static task
static1
Behavioral task
behavioral1
Sample
193d3b57054d5a6b791995792f232133f7a9d1988834da6736c73a379f88f7b2.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
193d3b57054d5a6b791995792f232133f7a9d1988834da6736c73a379f88f7b2.exe
Resource
win10-20240404-en
Malware Config
Extracted
socks5systemz
dlfbies.info
krobvlp.ua
buuserf.com
http://buuserf.com/search/?q=67e28dd86d5ff028450dff177c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f571ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ff717c0ef909c3e
Targets
-
-
Target
193d3b57054d5a6b791995792f232133f7a9d1988834da6736c73a379f88f7b2
-
Size
4.8MB
-
MD5
5618252bc2559b564db89c7c50868bcf
-
SHA1
ff96d364bd5a98a2dc8d29fcc540956298b15a1c
-
SHA256
193d3b57054d5a6b791995792f232133f7a9d1988834da6736c73a379f88f7b2
-
SHA512
6b181e6cafd5352d7915d1e0c0eab123423fce8132cbf2aa6f12a57bf23ec05f0d35a098ec656a590f13a7b40febe74ffb9507ff887f58930f618d319df2d46d
-
SSDEEP
98304:mxO1GDvbTGYhb8QSfJEly4x3AJki9zVfrqs0xIFaA8UG/mZf:mBrGYhEREly4x3CzVfrqsAD1mf
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-