General
-
Target
0eb68dd50c83db7df7a474ca0bcbcea41dbb854c0f9b89a8ddf666d350ddd552
-
Size
5.0MB
-
Sample
240621-xc25eatcpj
-
MD5
bc1daf6bf373ff4352dca4cf2363b694
-
SHA1
844e970496fefbbd9a3a5a22c35bf0da97d91b09
-
SHA256
0eb68dd50c83db7df7a474ca0bcbcea41dbb854c0f9b89a8ddf666d350ddd552
-
SHA512
f96a2353542f5c9b07479e1621a5bad6014e052b61ed4423e65d8d0310c79ec0f6a008a7b00eeb5104ac46b0282ea31ebc8e7989b1a8b4d7b7a855d27a8a72c0
-
SSDEEP
98304:mGXq9UoyHs5hQsg0E2B8ntd4C/BST5cAxmCowx8QBMPC0YnnJJajE+Oor8Yq7:/XqCTYh9g0/HSBStNmnwxhJJJanro
Static task
static1
Behavioral task
behavioral1
Sample
0eb68dd50c83db7df7a474ca0bcbcea41dbb854c0f9b89a8ddf666d350ddd552.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0eb68dd50c83db7df7a474ca0bcbcea41dbb854c0f9b89a8ddf666d350ddd552.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
socks5systemz
csubiev.net
http://csubiev.net/search/?q=67e28dd86c0ca72e110aab177c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa48e8889b5e4fa9281ae978f671ea771795af8e05c645db22f31df92d8b38e316a667d307eca743ec4c2b07b52966923a6f87f614c4e99d
bgfqvsj.com
Targets
-
-
Target
0eb68dd50c83db7df7a474ca0bcbcea41dbb854c0f9b89a8ddf666d350ddd552
-
Size
5.0MB
-
MD5
bc1daf6bf373ff4352dca4cf2363b694
-
SHA1
844e970496fefbbd9a3a5a22c35bf0da97d91b09
-
SHA256
0eb68dd50c83db7df7a474ca0bcbcea41dbb854c0f9b89a8ddf666d350ddd552
-
SHA512
f96a2353542f5c9b07479e1621a5bad6014e052b61ed4423e65d8d0310c79ec0f6a008a7b00eeb5104ac46b0282ea31ebc8e7989b1a8b4d7b7a855d27a8a72c0
-
SSDEEP
98304:mGXq9UoyHs5hQsg0E2B8ntd4C/BST5cAxmCowx8QBMPC0YnnJJajE+Oor8Yq7:/XqCTYh9g0/HSBStNmnwxhJJJanro
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-