General
-
Target
94bcd577f129019a00b82d2636be3890a7263cc7c24723f4f07615649aea939c
-
Size
4.6MB
-
Sample
240624-ganagasajk
-
MD5
41d503622e90c6940ad98eff0345f78d
-
SHA1
75fa99196a34331aae197f1f3c11744a6cd227c7
-
SHA256
94bcd577f129019a00b82d2636be3890a7263cc7c24723f4f07615649aea939c
-
SHA512
fbe08a5c583c8b4de96a822a62841bbe9db2361f361b6851449673fcf9b1a2020951955733bb399129b040010ad6b4bf48076422f6df5349659688af3afb5295
-
SSDEEP
98304:mvC8Tf6DjIg4HgBAlzXwDtlgHbX2fzAWcM9msKg6w5YzgNzOPmI4:OC8T8307lzA5l+Gfz59m5gTYzgNKOI4
Static task
static1
Behavioral task
behavioral1
Sample
94bcd577f129019a00b82d2636be3890a7263cc7c24723f4f07615649aea939c.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
94bcd577f129019a00b82d2636be3890a7263cc7c24723f4f07615649aea939c.exe
Resource
win10-20240611-en
Malware Config
Extracted
socks5systemz
dimpufq.info
kbkkfon.ua
ddytdnd.info
http://ddytdnd.info/search/?q=67e28dd8690ba728400aae4c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ff613c0e8919e38
Targets
-
-
Target
94bcd577f129019a00b82d2636be3890a7263cc7c24723f4f07615649aea939c
-
Size
4.6MB
-
MD5
41d503622e90c6940ad98eff0345f78d
-
SHA1
75fa99196a34331aae197f1f3c11744a6cd227c7
-
SHA256
94bcd577f129019a00b82d2636be3890a7263cc7c24723f4f07615649aea939c
-
SHA512
fbe08a5c583c8b4de96a822a62841bbe9db2361f361b6851449673fcf9b1a2020951955733bb399129b040010ad6b4bf48076422f6df5349659688af3afb5295
-
SSDEEP
98304:mvC8Tf6DjIg4HgBAlzXwDtlgHbX2fzAWcM9msKg6w5YzgNzOPmI4:OC8T8307lzA5l+Gfz59m5gTYzgNKOI4
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-