General
-
Target
27fcc68941217c5d8ccd83bb5b1f5ef8c1e4afed196a5d7d152084f88d8ab00d
-
Size
5.0MB
-
Sample
240620-bclxjazela
-
MD5
72e9a5e9c7a4ab7b2808ccfff3724800
-
SHA1
52e00e8426659bf0254ad37efcd635748733bc70
-
SHA256
27fcc68941217c5d8ccd83bb5b1f5ef8c1e4afed196a5d7d152084f88d8ab00d
-
SHA512
bc83faae57edd7c6dbb833c7f99ab08e8ce3ed46fa9592c39b79a71cb28c8ab8a1829175e557830583d1585993db6b7c0ecc38bf1a80016cd2b3bbf308e8539a
-
SSDEEP
98304:mnEhhQ0CkErOO34gteQED1eNnz66A3763zZiDKXcHICsqRvP+wy+bXsk:JhhQ0CkErOy7SkzS3+jXAkgvyC8k
Static task
static1
Behavioral task
behavioral1
Sample
27fcc68941217c5d8ccd83bb5b1f5ef8c1e4afed196a5d7d152084f88d8ab00d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
27fcc68941217c5d8ccd83bb5b1f5ef8c1e4afed196a5d7d152084f88d8ab00d.exe
Resource
win11-20240419-en
Malware Config
Extracted
socks5systemz
bfsigcu.com
ezalebr.ua
Targets
-
-
Target
27fcc68941217c5d8ccd83bb5b1f5ef8c1e4afed196a5d7d152084f88d8ab00d
-
Size
5.0MB
-
MD5
72e9a5e9c7a4ab7b2808ccfff3724800
-
SHA1
52e00e8426659bf0254ad37efcd635748733bc70
-
SHA256
27fcc68941217c5d8ccd83bb5b1f5ef8c1e4afed196a5d7d152084f88d8ab00d
-
SHA512
bc83faae57edd7c6dbb833c7f99ab08e8ce3ed46fa9592c39b79a71cb28c8ab8a1829175e557830583d1585993db6b7c0ecc38bf1a80016cd2b3bbf308e8539a
-
SSDEEP
98304:mnEhhQ0CkErOO34gteQED1eNnz66A3763zZiDKXcHICsqRvP+wy+bXsk:JhhQ0CkErOy7SkzS3+jXAkgvyC8k
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-