General
-
Target
9385cbf1c87afce218fb2ab5137791a9.bin
-
Size
6.0MB
-
Sample
241107-b23lksvlal
-
MD5
2c3ef375510ebee2a0c7e7d6c4ffe01e
-
SHA1
73aea0ac00767f3a878ba0bdad9b7fa340a208fa
-
SHA256
22fb2d2bd7336a1e5aec585c8013f668a64387befc079da0039a25f0fcae0eb5
-
SHA512
6a5d1e9365d66e0e8250d469033f139b62a2d846be44e8fbc0bb05ef67b39a9be5e96d2effd167aaea946e4de968448afbf3670784705a184d16ca4fffa8c537
-
SSDEEP
98304:AmU5/tFlY70mafSJU0Xndm+4BptEMCDWh0KGIBQBMGNS/779rzCo3CaZmQ6Rgc:AmU51Y70nOnYXErDQ3nONS77B+Cholyc
Static task
static1
Behavioral task
behavioral1
Sample
6976b9f9d63c2485354ecba5d56e69fd60b18b9dd8753d7cdc0ca74187d8690b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6976b9f9d63c2485354ecba5d56e69fd60b18b9dd8753d7cdc0ca74187d8690b.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
6976b9f9d63c2485354ecba5d56e69fd60b18b9dd8753d7cdc0ca74187d8690b.exe
-
Size
6.0MB
-
MD5
9385cbf1c87afce218fb2ab5137791a9
-
SHA1
a18b9ad6628e4a14d0dc168d836b1184138592ec
-
SHA256
6976b9f9d63c2485354ecba5d56e69fd60b18b9dd8753d7cdc0ca74187d8690b
-
SHA512
5594ef83414c001bd1802a65dfd31fe58b0eabcbe6ed288395f6bd6d5b07e72a53687f23f3b53bebb22a00c283929b1c00e248a3cc749eaf531832382fd4ac72
-
SSDEEP
98304:4JQ+iQOA7dcPFAvEEtsGMEgWuVZImQYpo8ZVT1pJn7UK5seeDaXX:+QvQOpCVcEobZphZVVoOn
Score10/10-
Detect Socks5Systemz Payload
-
Socks5systemz family
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-