General
-
Target
596116c65df4aa37c8018dc9acc4eb56.bin
-
Size
3.4MB
-
Sample
240802-cjhn5athkc
-
MD5
6d629b728df1c67adfb76cec3adbfaa1
-
SHA1
2469d6fc70927586810def38bbb7530d031e7afa
-
SHA256
f75e1f680962a8a9e7c170684e2a65c32ff733196ac4b6e5a6749031c496333e
-
SHA512
c1b06695842edae35539f7115a24c9a2600efc05850567da1d584139ffc276ae11fe6595aaac1dbfb9bb0648fce08394957728a732f87c71781b94ae5b157b94
-
SSDEEP
98304:Gk5VRAT51Z+zJpxASbPZZ++AzzpuK6TxQebDKbNQL9xb:GkPRAruJUSbX2zzOQNQn
Static task
static1
Behavioral task
behavioral1
Sample
e79b1536ac9710a2fffc8bf4d3337e344aee2897d116dd48b9a4c4e174d49acf.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e79b1536ac9710a2fffc8bf4d3337e344aee2897d116dd48b9a4c4e174d49acf.exe
Resource
win10v2004-20240730-en
Malware Config
Extracted
socks5systemz
-
rc4_key
i4hiea56#7b&dfw3
Targets
-
-
Target
e79b1536ac9710a2fffc8bf4d3337e344aee2897d116dd48b9a4c4e174d49acf.exe
-
Size
3.4MB
-
MD5
596116c65df4aa37c8018dc9acc4eb56
-
SHA1
1e323c23b20007998b7c104a27cfd1b5c0f878f2
-
SHA256
e79b1536ac9710a2fffc8bf4d3337e344aee2897d116dd48b9a4c4e174d49acf
-
SHA512
4353b1a98e7abae2e6006a82bb34f61fcfa6a4cb95c2130ed7da00fdc979e37f83c47154655aad4aafadba12fb58b12f0b6dd3313e67843d27ae7add0b4e766e
-
SSDEEP
98304:sjBf676DpowCfpV48epyfqhhYW/8ZEflpvEvCYjxlE:KfA6FowCfrMpyMR8ZEflaqYjxu
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-