General
-
Target
de49a7ee152ac6bdc43bee28b707ed152f9d6754884a405abd3efc5845bdd833
-
Size
4.5MB
-
Sample
240618-ztl6ma1app
-
MD5
7ba0fbe5697771fa27b650273c8824fc
-
SHA1
3737bf7b8a60f6a13fbdf627249e3369aa355730
-
SHA256
de49a7ee152ac6bdc43bee28b707ed152f9d6754884a405abd3efc5845bdd833
-
SHA512
b088b42c94ef8df3233bf6da8f6cdeeb0d666b6712644edca6ee0cd06fe4ffdb4b548a8d127e68ba6a0b833783b568f1478a0e222c630d3bcec19d7426bc54ee
-
SSDEEP
98304:meoqEgukLFb6ZY9guhkhrJTYQy3BZK5ijs3BiT1M:+g9b6ghkXo8IA85M
Static task
static1
Behavioral task
behavioral1
Sample
de49a7ee152ac6bdc43bee28b707ed152f9d6754884a405abd3efc5845bdd833.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
de49a7ee152ac6bdc43bee28b707ed152f9d6754884a405abd3efc5845bdd833.exe
Resource
win11-20240508-en
Malware Config
Extracted
socks5systemz
aqkuwog.ru
ejtiyoe.ua
Targets
-
-
Target
de49a7ee152ac6bdc43bee28b707ed152f9d6754884a405abd3efc5845bdd833
-
Size
4.5MB
-
MD5
7ba0fbe5697771fa27b650273c8824fc
-
SHA1
3737bf7b8a60f6a13fbdf627249e3369aa355730
-
SHA256
de49a7ee152ac6bdc43bee28b707ed152f9d6754884a405abd3efc5845bdd833
-
SHA512
b088b42c94ef8df3233bf6da8f6cdeeb0d666b6712644edca6ee0cd06fe4ffdb4b548a8d127e68ba6a0b833783b568f1478a0e222c630d3bcec19d7426bc54ee
-
SSDEEP
98304:meoqEgukLFb6ZY9guhkhrJTYQy3BZK5ijs3BiT1M:+g9b6ghkXo8IA85M
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-