General
-
Target
980e61666fe0254779c3c3a68fc670f68737ab29552e3001c81ea3e1c0e33c8e
-
Size
2.9MB
-
Sample
240929-a6k2natarm
-
MD5
be421b490df6a035542f7d839b6a4494
-
SHA1
75fe4cce076dfef3b092051cd7040b865b980d9d
-
SHA256
980e61666fe0254779c3c3a68fc670f68737ab29552e3001c81ea3e1c0e33c8e
-
SHA512
e2ede8df8cf81c295f57530d63f74906e68b9a177ffb77e3af5da1cce7156457522998cd06d6903bb9dac0061b7b48205fc83225d2f04cd6fd5399f61b6a4b97
-
SSDEEP
49152:TG9P0OlhH01dAsg4/HI3PrTrHKo6SQHclfDa9ElXKXrMGCy4TGRMWYA8tsUM05:K9Pt21ng4/oDvxQHoamhsrMhKMUysUd5
Static task
static1
Behavioral task
behavioral1
Sample
980e61666fe0254779c3c3a68fc670f68737ab29552e3001c81ea3e1c0e33c8e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
980e61666fe0254779c3c3a68fc670f68737ab29552e3001c81ea3e1c0e33c8e.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
socks5systemz
51.159.66.125
217.23.6.51
151.80.38.159
217.23.9.168
37.187.122.227
http://datasheet.fun/manual/avon_5_2022.pdf?%.8x
-
rc4_key
heyfg645fdhwi
Targets
-
-
Target
980e61666fe0254779c3c3a68fc670f68737ab29552e3001c81ea3e1c0e33c8e
-
Size
2.9MB
-
MD5
be421b490df6a035542f7d839b6a4494
-
SHA1
75fe4cce076dfef3b092051cd7040b865b980d9d
-
SHA256
980e61666fe0254779c3c3a68fc670f68737ab29552e3001c81ea3e1c0e33c8e
-
SHA512
e2ede8df8cf81c295f57530d63f74906e68b9a177ffb77e3af5da1cce7156457522998cd06d6903bb9dac0061b7b48205fc83225d2f04cd6fd5399f61b6a4b97
-
SSDEEP
49152:TG9P0OlhH01dAsg4/HI3PrTrHKo6SQHclfDa9ElXKXrMGCy4TGRMWYA8tsUM05:K9Pt21ng4/oDvxQHoamhsrMhKMUysUd5
Score10/10-
Detect Socks5Systemz Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-