General
-
Target
1b346ec396b4e77f9be49dbf02e7fcc10369ee51d87ee7a86b416e921a356261
-
Size
5.0MB
-
Sample
240625-zacsvatfqk
-
MD5
9bab6df6584d4e42c59236ad1b77b982
-
SHA1
273013e818a172e3e263d66bede6503cd5fdb1e0
-
SHA256
1b346ec396b4e77f9be49dbf02e7fcc10369ee51d87ee7a86b416e921a356261
-
SHA512
53f3d1d61b1242f7ba471e533fc8f14f5712e13168e9f57e70fa8ae7f0c20c02350037f17361070b8b80c5aba4dbfaadc8a5e74f75e1b046c78f55f5578a053e
-
SSDEEP
98304:mktDtFcyon1JUR+JtE4w0cvWj2BsHq6J6p9NAHpwQe:Tne9uR+JLqWVLje
Static task
static1
Behavioral task
behavioral1
Sample
1b346ec396b4e77f9be49dbf02e7fcc10369ee51d87ee7a86b416e921a356261.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
1b346ec396b4e77f9be49dbf02e7fcc10369ee51d87ee7a86b416e921a356261.exe
Resource
win11-20240611-en
Malware Config
Extracted
socks5systemz
dlhpbnd.info
http://dlhpbnd.info/search/?q=67e28dd83f5aa4794209ff1c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa48e8889b5e4fa9281ae978a271ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608ff612c4e891933f
aicoxtd.ru
http://aicoxtd.ru/search/?q=67e28dd83d0ea428165baf167c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978a371ea771795af8e05c645db22f31dfe339426fa12a466c553adb719a9577e55b8603e983a608ff612c4e891933f
http://aicoxtd.ru/search/?q=67e28dd83d0ea428165baf167c27d78406abdd88be4b12eab517aa5c96bd86ea92834496148ab2865b77f80ebad9c40f7cb63037ed2ab423a4664383ba915d911ec07bb606a0708727e40ea678c751bbe34efb0e2807e12571c17f3e83fe16c1e6969e3cc96692
Targets
-
-
Target
1b346ec396b4e77f9be49dbf02e7fcc10369ee51d87ee7a86b416e921a356261
-
Size
5.0MB
-
MD5
9bab6df6584d4e42c59236ad1b77b982
-
SHA1
273013e818a172e3e263d66bede6503cd5fdb1e0
-
SHA256
1b346ec396b4e77f9be49dbf02e7fcc10369ee51d87ee7a86b416e921a356261
-
SHA512
53f3d1d61b1242f7ba471e533fc8f14f5712e13168e9f57e70fa8ae7f0c20c02350037f17361070b8b80c5aba4dbfaadc8a5e74f75e1b046c78f55f5578a053e
-
SSDEEP
98304:mktDtFcyon1JUR+JtE4w0cvWj2BsHq6J6p9NAHpwQe:Tne9uR+JLqWVLje
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-