General
-
Target
2265e5db5087396050269cfb635399a2bcf6a23386aa0eacb0b13160f81931f0
-
Size
4.5MB
-
Sample
240620-2jz1vavcmj
-
MD5
c13843c63e1f98974b66244bd4c0a351
-
SHA1
ba4ddd69e33c311b0145726724f812aea82413e1
-
SHA256
2265e5db5087396050269cfb635399a2bcf6a23386aa0eacb0b13160f81931f0
-
SHA512
762c56c753a4b579ed13fa05a585f7deae9d5a827724d9bc4c43978368a5c08cf922a3f0cd535eb5396b8661cca84732d3fe41facc54d08ef547f5076fa3c7aa
-
SSDEEP
98304:mrlYGBzJllzhzYmM8GTRwYTbZN1WHr5lIQdAAoFB:qRnjkyYTLkDIQroP
Static task
static1
Behavioral task
behavioral1
Sample
2265e5db5087396050269cfb635399a2bcf6a23386aa0eacb0b13160f81931f0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2265e5db5087396050269cfb635399a2bcf6a23386aa0eacb0b13160f81931f0.exe
Resource
win10-20240404-en
Malware Config
Extracted
socks5systemz
eboinwd.ua
goceebm.com
bpbghjm.com
http://bpbghjm.com/search/?q=67e28dd8645fa72f495daa1c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978a771ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ff718c2ec949b39
Targets
-
-
Target
2265e5db5087396050269cfb635399a2bcf6a23386aa0eacb0b13160f81931f0
-
Size
4.5MB
-
MD5
c13843c63e1f98974b66244bd4c0a351
-
SHA1
ba4ddd69e33c311b0145726724f812aea82413e1
-
SHA256
2265e5db5087396050269cfb635399a2bcf6a23386aa0eacb0b13160f81931f0
-
SHA512
762c56c753a4b579ed13fa05a585f7deae9d5a827724d9bc4c43978368a5c08cf922a3f0cd535eb5396b8661cca84732d3fe41facc54d08ef547f5076fa3c7aa
-
SSDEEP
98304:mrlYGBzJllzhzYmM8GTRwYTbZN1WHr5lIQdAAoFB:qRnjkyYTLkDIQroP
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-