Overview
overview
10Static
static
10infected20...01.zip
windows7-x64
infected20...01.zip
windows10-2004-x64
infected20...01.zip
android-11-x64
infected20...01.zip
android-13-x64
infected20...01.zip
macos-10.15-amd64
infected20...01.zip
ubuntu-18.04-amd64
infected20...01.zip
debian-9-armhf
infected20...01.zip
debian-9-mips
infected20...01.zip
debian-9-mipsel
1�L�iŚ.pyc
windows7-x64
1�L�iŚ.pyc
windows10-2004-x64
1�L�iŚ.pyc
android-9-x86
1�L�iŚ.pyc
android-13-x64
1�L�iŚ.pyc
macos-10.15-amd64
1�L�iŚ.pyc
ubuntu-18.04-amd64
1�L�iŚ.pyc
debian-9-armhf
1�L�iŚ.pyc
debian-9-mips
1�L�iŚ.pyc
debian-9-mipsel
helper.bat
windows7-x64
8helper.bat
windows10-2004-x64
8helper.bat
android-9-x86
helper.bat
android-13-x64
helper.bat
macos-10.15-amd64
helper.bat
ubuntu-18.04-amd64
helper.bat
debian-9-armhf
helper.bat
debian-9-mips
helper.bat
debian-9-mipsel
setup.exe
windows7-x64
10setup.exe
windows10-2004-x64
10setup.exe
android-11-x64
setup.exe
android-13-x64
setup.exe
macos-10.15-amd64
Resubmissions
21-01-2025 13:35
250121-qvptgawqbk 1021-01-2025 11:58
250121-n5b91ssqem 1021-01-2025 11:44
250121-nwlr4a1qhs 1021-01-2025 11:07
250121-m7zbws1kfn 1017-07-2024 20:08
240717-ywvp4swhjk 10Analysis
-
max time kernel
293s -
max time network
279s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 11:07
Behavioral task
behavioral1
Sample
infected2024071401.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
infected2024071401.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
infected2024071401.zip
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
infected2024071401.zip
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
infected2024071401.zip
Resource
macos-20241101-en
Behavioral task
behavioral6
Sample
infected2024071401.zip
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral7
Sample
infected2024071401.zip
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral8
Sample
infected2024071401.zip
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral9
Sample
infected2024071401.zip
Resource
debian9-mipsel-20240729-en
Behavioral task
behavioral10
Sample
1�L�iŚ.pyc
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
1�L�iŚ.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
1�L�iŚ.pyc
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral13
Sample
1�L�iŚ.pyc
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral14
Sample
1�L�iŚ.pyc
Resource
macos-20241106-en
Behavioral task
behavioral15
Sample
1�L�iŚ.pyc
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral16
Sample
1�L�iŚ.pyc
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral17
Sample
1�L�iŚ.pyc
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral18
Sample
1�L�iŚ.pyc
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral19
Sample
helper.bat
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
helper.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
helper.bat
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral22
Sample
helper.bat
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral23
Sample
helper.bat
Resource
macos-20241101-en
Behavioral task
behavioral24
Sample
helper.bat
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral25
Sample
helper.bat
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral26
Sample
helper.bat
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral27
Sample
helper.bat
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral28
Sample
setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
setup.exe
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral31
Sample
setup.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral32
Sample
setup.exe
Resource
macos-20241106-en
General
-
Target
setup.exe
-
Size
5.0MB
-
MD5
d6dd2275a92bd37adb3a886255a431ef
-
SHA1
a28933f79041f29a681cfb444fc7b8d63435c510
-
SHA256
e51f3f998cd7c0783deb68c18c39b6ccf77f5dca0b611ddd23dcf09845ab8b31
-
SHA512
1c303bf3dfc8ba54d02096615cdbf34752a312c2478f16c3fc38a8e75b2ab0619fb46e434b2b96aa89114873c3659db91fb9e0308fe47d91d0b9124e48814ded
-
SSDEEP
98304:Cf6hoGwhlxoORmkoq6LoTxHVo81F728I/e6KMMj9BZCloOhyNnh+IDQxb:avpeAZILoTFT1s8n9TfhdDQB
Malware Config
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral28/memory/2668-94-0x0000000002660000-0x0000000002702000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Executes dropped EXE 3 IoCs
pid Process 2904 setup.tmp 1880 vpkaudioplayer.exe 2668 vpkaudioplayer.exe -
Loads dropped DLL 5 IoCs
pid Process 1872 setup.exe 2904 setup.tmp 2904 setup.tmp 2904 setup.tmp 2904 setup.tmp -
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 91.211.247.248 Destination IP 152.89.198.214 Destination IP 152.89.198.214 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpkaudioplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpkaudioplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 setup.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2904 1872 setup.exe 28 PID 1872 wrote to memory of 2904 1872 setup.exe 28 PID 1872 wrote to memory of 2904 1872 setup.exe 28 PID 1872 wrote to memory of 2904 1872 setup.exe 28 PID 1872 wrote to memory of 2904 1872 setup.exe 28 PID 1872 wrote to memory of 2904 1872 setup.exe 28 PID 1872 wrote to memory of 2904 1872 setup.exe 28 PID 2904 wrote to memory of 1880 2904 setup.tmp 29 PID 2904 wrote to memory of 1880 2904 setup.tmp 29 PID 2904 wrote to memory of 1880 2904 setup.tmp 29 PID 2904 wrote to memory of 1880 2904 setup.tmp 29 PID 2904 wrote to memory of 2668 2904 setup.tmp 30 PID 2904 wrote to memory of 2668 2904 setup.tmp 30 PID 2904 wrote to memory of 2668 2904 setup.tmp 30 PID 2904 wrote to memory of 2668 2904 setup.tmp 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe sh $MOZILLA\\nPLUGIN %SIGILL% "SIGTERM|DESTROY|SIGKILL"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\is-8E1OG.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-8E1OG.tmp\setup.tmp" /SL5="$401B4,4997647,54272,C:\Users\Admin\AppData\Local\Temp\setup.exe" sh $MOZILLA\\nPLUGIN %SIGILL% "SIGTERM|DESTROY|SIGKILL"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\VPK Audio Player\vpkaudioplayer.exe"C:\Users\Admin\AppData\Local\VPK Audio Player\vpkaudioplayer.exe" -i3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1880
-
-
C:\Users\Admin\AppData\Local\VPK Audio Player\vpkaudioplayer.exe"C:\Users\Admin\AppData\Local\VPK Audio Player\vpkaudioplayer.exe" -s3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
680KB
MD5c0c76b135dada6ca7bfa7f909d8c4d9b
SHA11142d8d15d68abc87ab39c3ef3f9d2dfa7615112
SHA256fba03e4d43d3fd94897cb65c1d0d4d6f851a5ba21a02bc343a8abe365d344770
SHA51249d44f28f4319e4e545f709abed52ed70462db179038d3ae31c182a3046d5d30ad151677104a5df33830c81998b8223090691e8f07f913a9ef3afeaaee011b7f
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
4.0MB
MD5c1ebb045df9ea1406bd9e5bd7d989eb1
SHA145c9deaa50e8634088adfb64810d9f51af16975b
SHA256f09a1182c81d7306f666e901b8bb394fe6341d28ea7ec8bb1edc14a538a3d009
SHA512a9e00778114c1b5c83ec5ead7a97fef29392f22e2c827d0ac8bd11eb3d041a6e75ef1974655401b6ae4c8c65938608994da9af28c9becbefaf8bff7c3a9c49c1