General
-
Target
ed893f9526bcacb73f703e799946d0ab8274e3c74d38d1ab21dff1018b171f1a
-
Size
5.6MB
-
Sample
240617-fwaqtszemn
-
MD5
edd8fbb38dbf23b5f903b9a50fa35feb
-
SHA1
ccc6c7191e44c5887b8f1a2d13ae93f751afbb11
-
SHA256
ed893f9526bcacb73f703e799946d0ab8274e3c74d38d1ab21dff1018b171f1a
-
SHA512
1a9c66b0e792f44dcab93544149ce9715863e8b4355062d66fa40e42378a0494569748c01d06cdc3ca6db4d1f6f41ab35fbb0062c07569b8e5dcccdaea9fe945
-
SSDEEP
98304:my7M1IRkFVWvEM+xoPsMIGojBxpOf5/p60nANJGY7zfytFrKR:yIGUEMGhFCf5/kVzfyPKR
Static task
static1
Behavioral task
behavioral1
Sample
ed893f9526bcacb73f703e799946d0ab8274e3c74d38d1ab21dff1018b171f1a.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ed893f9526bcacb73f703e799946d0ab8274e3c74d38d1ab21dff1018b171f1a.exe
Resource
win10-20240404-en
Malware Config
Extracted
socks5systemz
ddyhrfi.info
krqmrsx.ua
bvjzgig.com
http://bvjzgig.com/search/?q=67e28dd86d5ff028450dff177c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f571ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ff717c0ee97993c
Targets
-
-
Target
ed893f9526bcacb73f703e799946d0ab8274e3c74d38d1ab21dff1018b171f1a
-
Size
5.6MB
-
MD5
edd8fbb38dbf23b5f903b9a50fa35feb
-
SHA1
ccc6c7191e44c5887b8f1a2d13ae93f751afbb11
-
SHA256
ed893f9526bcacb73f703e799946d0ab8274e3c74d38d1ab21dff1018b171f1a
-
SHA512
1a9c66b0e792f44dcab93544149ce9715863e8b4355062d66fa40e42378a0494569748c01d06cdc3ca6db4d1f6f41ab35fbb0062c07569b8e5dcccdaea9fe945
-
SSDEEP
98304:my7M1IRkFVWvEM+xoPsMIGojBxpOf5/p60nANJGY7zfytFrKR:yIGUEMGhFCf5/kVzfyPKR
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-