General
-
Target
ec92fd535000437c1d7c6cf896ea3e9583ac656e5d2953da5cdcbb610dae6dd6
-
Size
5.0MB
-
Sample
240617-fv17dswbqb
-
MD5
8b662840665474400b0b83a5ce5dfba9
-
SHA1
1b7ea182554a8728729cba9f02a8f7a9ac74795a
-
SHA256
ec92fd535000437c1d7c6cf896ea3e9583ac656e5d2953da5cdcbb610dae6dd6
-
SHA512
8226e2d86aa2a59319979c1a1b065544fd363452dd542e308cb3ea1fabeaa6858632f77d1bdb56cc31fe1a7c0b4db049a484b908f3d1e40acb7c526fd0b921c1
-
SSDEEP
98304:m1p3kTW+00NTnsnitaFYrjmyhOG8p8Xbc9CSKHjyqA25ioukkOd42:yua+00dsndFijFhObp8XbcQSWjy25yHC
Static task
static1
Behavioral task
behavioral1
Sample
ec92fd535000437c1d7c6cf896ea3e9583ac656e5d2953da5cdcbb610dae6dd6.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ec92fd535000437c1d7c6cf896ea3e9583ac656e5d2953da5cdcbb610dae6dd6.exe
Resource
win10-20240404-en
Malware Config
Extracted
socks5systemz
dlkmukw.info
firttec.ru
bbiojpa.com
http://bbiojpa.com/search/?q=67e28dd86d5ff028450dff177c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f571ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ff717c0ee979b3b
Targets
-
-
Target
ec92fd535000437c1d7c6cf896ea3e9583ac656e5d2953da5cdcbb610dae6dd6
-
Size
5.0MB
-
MD5
8b662840665474400b0b83a5ce5dfba9
-
SHA1
1b7ea182554a8728729cba9f02a8f7a9ac74795a
-
SHA256
ec92fd535000437c1d7c6cf896ea3e9583ac656e5d2953da5cdcbb610dae6dd6
-
SHA512
8226e2d86aa2a59319979c1a1b065544fd363452dd542e308cb3ea1fabeaa6858632f77d1bdb56cc31fe1a7c0b4db049a484b908f3d1e40acb7c526fd0b921c1
-
SSDEEP
98304:m1p3kTW+00NTnsnitaFYrjmyhOG8p8Xbc9CSKHjyqA25ioukkOd42:yua+00dsndFijFhObp8XbcQSWjy25yHC
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-