General
-
Target
945103d43a3b4db2fdded297ec9625e54f4d7f494aeb27280e133bac22389673
-
Size
5.8MB
-
Sample
240620-2w3bqs1fqd
-
MD5
875191f204d65fba87578811a903b55c
-
SHA1
f5f246da6aa53095f3fd1cc5b798af0f626464f6
-
SHA256
945103d43a3b4db2fdded297ec9625e54f4d7f494aeb27280e133bac22389673
-
SHA512
18319a7dac083bbacaff0d23e6d04c2f45d1af1655830e063102b70789c8ef065e824dfbc2d5073edb7884326faefdda813cb0bd7135e57722d9b383f65ef84b
-
SSDEEP
98304:mat5MY7lL4fOoffsRGRS2PJrHKLQ/wAzRQwLn368K3BVKQI+fkrYtg91qSe/fC:n5MqBeO+SwJWAza1RVw+fGv1unC
Static task
static1
Behavioral task
behavioral1
Sample
945103d43a3b4db2fdded297ec9625e54f4d7f494aeb27280e133bac22389673.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
945103d43a3b4db2fdded297ec9625e54f4d7f494aeb27280e133bac22389673.exe
Resource
win10-20240404-en
Malware Config
Extracted
socks5systemz
bwiuvwe.com
kjxibzx.ua
ccnumjd.net
http://ccnumjd.net/search/?q=67e28dd86809f27b415ba51b7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa1de8889b5e4fa9281ae978a771ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ff718c2eb979d3a
Targets
-
-
Target
945103d43a3b4db2fdded297ec9625e54f4d7f494aeb27280e133bac22389673
-
Size
5.8MB
-
MD5
875191f204d65fba87578811a903b55c
-
SHA1
f5f246da6aa53095f3fd1cc5b798af0f626464f6
-
SHA256
945103d43a3b4db2fdded297ec9625e54f4d7f494aeb27280e133bac22389673
-
SHA512
18319a7dac083bbacaff0d23e6d04c2f45d1af1655830e063102b70789c8ef065e824dfbc2d5073edb7884326faefdda813cb0bd7135e57722d9b383f65ef84b
-
SSDEEP
98304:mat5MY7lL4fOoffsRGRS2PJrHKLQ/wAzRQwLn368K3BVKQI+fkrYtg91qSe/fC:n5MqBeO+SwJWAza1RVw+fGv1unC
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-