General
-
Target
dbe3ff006102c06366867815ed094d42f93fbcdcfcd174c3b1b67b0aad22c22a
-
Size
4.5MB
-
Sample
240618-ycgddavfph
-
MD5
e8c1119867cb08dc5532cce43e4e5a27
-
SHA1
9e741007d25bc6ca50f1be5662bb3f581e6c4e1e
-
SHA256
dbe3ff006102c06366867815ed094d42f93fbcdcfcd174c3b1b67b0aad22c22a
-
SHA512
2d967a6d6baab76ad144bc8f26d75a2e015f6390300185d4a60449d0ec8efc7db15322f0260d2e9314e6dc99ec8205a97fa113826d57c8c474a28c6f9505e2d2
-
SSDEEP
98304:m5hx/KKVCaDUl/VDXBCJA6oqDYwURtXjzkDM5j8MrG9Po6eDHiX:shkKV7Yl/nCJADqDWDkDA8+GW6RX
Static task
static1
Behavioral task
behavioral1
Sample
dbe3ff006102c06366867815ed094d42f93fbcdcfcd174c3b1b67b0aad22c22a.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
dbe3ff006102c06366867815ed094d42f93fbcdcfcd174c3b1b67b0aad22c22a.exe
Resource
win11-20240508-en
Malware Config
Extracted
socks5systemz
bfeftih.com
http://bfeftih.com/search/?q=67e28dd83e0bfb2e455aa5187c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ae8889b5e4fa9281ae978f171ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ff716c3e6909f32
http://bfeftih.com/search/?q=67e28dd83e0bfb2e455aa5187c27d78406abdd88be4b12eab517aa5c96bd86ee92864b895a8bbc896c58e713bc90c91f36b5281fc235a925ed3e52d6bd974a95129070b616e96cc92be510b866db52b2e34aec4c2b14a82966836f23d7f210c7ee9d9d38c46a931f
buquedf.com
http://buquedf.com/search/?q=67e28dd8380ffb281106fa1d7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c645db22f31dfe339426fa12a466c553adb719a9577e55b8603e983a608ff716c3e6909f33
Targets
-
-
Target
dbe3ff006102c06366867815ed094d42f93fbcdcfcd174c3b1b67b0aad22c22a
-
Size
4.5MB
-
MD5
e8c1119867cb08dc5532cce43e4e5a27
-
SHA1
9e741007d25bc6ca50f1be5662bb3f581e6c4e1e
-
SHA256
dbe3ff006102c06366867815ed094d42f93fbcdcfcd174c3b1b67b0aad22c22a
-
SHA512
2d967a6d6baab76ad144bc8f26d75a2e015f6390300185d4a60449d0ec8efc7db15322f0260d2e9314e6dc99ec8205a97fa113826d57c8c474a28c6f9505e2d2
-
SSDEEP
98304:m5hx/KKVCaDUl/VDXBCJA6oqDYwURtXjzkDM5j8MrG9Po6eDHiX:shkKV7Yl/nCJADqDWDkDA8+GW6RX
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-