General
-
Target
51bb1e820aa2e4148973c854ddb8a322cccca0f4885fb40cb62e760feaf8e9d9
-
Size
4.8MB
-
Sample
240617-fqtxhswaje
-
MD5
386c7d06155d8754f0eeddf9a984eef2
-
SHA1
1613630666cb0ba426ad0acf0cb8a6d7ee0d2a4e
-
SHA256
51bb1e820aa2e4148973c854ddb8a322cccca0f4885fb40cb62e760feaf8e9d9
-
SHA512
5e2e1b8229e5e6026277b1630cc718592667aeef3603979ca0a08f137856f3ebed5765dd699107db0646ced40d8e2ffa539877272ab62b4ac52e179ef0f39f82
-
SSDEEP
98304:my5CT2EQsbOgvAi9VaFgWoTKOwTuKRygJlt4A5nG/C:1CT2Hgvbbm4JwSKRy+BVG/C
Static task
static1
Behavioral task
behavioral1
Sample
51bb1e820aa2e4148973c854ddb8a322cccca0f4885fb40cb62e760feaf8e9d9.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
51bb1e820aa2e4148973c854ddb8a322cccca0f4885fb40cb62e760feaf8e9d9.exe
Resource
win10-20240404-en
Malware Config
Extracted
socks5systemz
bfidbcp.com
gdyctpo.com
ddekpbf.info
http://ddekpbf.info/search/?q=67e28dd86d5ff028450dff177c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f571ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ff717c0ef929d39
Targets
-
-
Target
51bb1e820aa2e4148973c854ddb8a322cccca0f4885fb40cb62e760feaf8e9d9
-
Size
4.8MB
-
MD5
386c7d06155d8754f0eeddf9a984eef2
-
SHA1
1613630666cb0ba426ad0acf0cb8a6d7ee0d2a4e
-
SHA256
51bb1e820aa2e4148973c854ddb8a322cccca0f4885fb40cb62e760feaf8e9d9
-
SHA512
5e2e1b8229e5e6026277b1630cc718592667aeef3603979ca0a08f137856f3ebed5765dd699107db0646ced40d8e2ffa539877272ab62b4ac52e179ef0f39f82
-
SSDEEP
98304:my5CT2EQsbOgvAi9VaFgWoTKOwTuKRygJlt4A5nG/C:1CT2Hgvbbm4JwSKRy+BVG/C
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-