Overview
overview
10Static
static
10infected20...01.zip
windows7-x64
infected20...01.zip
windows10-2004-x64
infected20...01.zip
android-11-x64
infected20...01.zip
android-13-x64
infected20...01.zip
macos-10.15-amd64
infected20...01.zip
ubuntu-18.04-amd64
infected20...01.zip
debian-9-armhf
infected20...01.zip
debian-9-mips
infected20...01.zip
debian-9-mipsel
1�L�iŚ.pyc
windows7-x64
1�L�iŚ.pyc
windows10-2004-x64
1�L�iŚ.pyc
android-9-x86
1�L�iŚ.pyc
android-13-x64
1�L�iŚ.pyc
macos-10.15-amd64
1�L�iŚ.pyc
ubuntu-18.04-amd64
1�L�iŚ.pyc
debian-9-armhf
1�L�iŚ.pyc
debian-9-mips
1�L�iŚ.pyc
debian-9-mipsel
helper.bat
windows7-x64
8helper.bat
windows10-2004-x64
8helper.bat
android-9-x86
helper.bat
android-13-x64
helper.bat
macos-10.15-amd64
helper.bat
ubuntu-18.04-amd64
helper.bat
debian-9-armhf
helper.bat
debian-9-mips
helper.bat
debian-9-mipsel
setup.exe
windows7-x64
10setup.exe
windows10-2004-x64
10setup.exe
android-11-x64
setup.exe
android-13-x64
setup.exe
macos-10.15-amd64
Resubmissions
21-01-2025 13:35
250121-qvptgawqbk 1021-01-2025 11:58
250121-n5b91ssqem 1021-01-2025 11:44
250121-nwlr4a1qhs 1021-01-2025 11:07
250121-m7zbws1kfn 1017-07-2024 20:08
240717-ywvp4swhjk 10Analysis
-
max time kernel
292s -
max time network
277s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 11:07
Behavioral task
behavioral1
Sample
infected2024071401.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
infected2024071401.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
infected2024071401.zip
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
infected2024071401.zip
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
infected2024071401.zip
Resource
macos-20241101-en
Behavioral task
behavioral6
Sample
infected2024071401.zip
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral7
Sample
infected2024071401.zip
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral8
Sample
infected2024071401.zip
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral9
Sample
infected2024071401.zip
Resource
debian9-mipsel-20240729-en
Behavioral task
behavioral10
Sample
1�L�iŚ.pyc
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
1�L�iŚ.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
1�L�iŚ.pyc
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral13
Sample
1�L�iŚ.pyc
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral14
Sample
1�L�iŚ.pyc
Resource
macos-20241106-en
Behavioral task
behavioral15
Sample
1�L�iŚ.pyc
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral16
Sample
1�L�iŚ.pyc
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral17
Sample
1�L�iŚ.pyc
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral18
Sample
1�L�iŚ.pyc
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral19
Sample
helper.bat
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
helper.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
helper.bat
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral22
Sample
helper.bat
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral23
Sample
helper.bat
Resource
macos-20241101-en
Behavioral task
behavioral24
Sample
helper.bat
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral25
Sample
helper.bat
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral26
Sample
helper.bat
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral27
Sample
helper.bat
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral28
Sample
setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
setup.exe
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral31
Sample
setup.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral32
Sample
setup.exe
Resource
macos-20241106-en
General
-
Target
setup.exe
-
Size
5.0MB
-
MD5
d6dd2275a92bd37adb3a886255a431ef
-
SHA1
a28933f79041f29a681cfb444fc7b8d63435c510
-
SHA256
e51f3f998cd7c0783deb68c18c39b6ccf77f5dca0b611ddd23dcf09845ab8b31
-
SHA512
1c303bf3dfc8ba54d02096615cdbf34752a312c2478f16c3fc38a8e75b2ab0619fb46e434b2b96aa89114873c3659db91fb9e0308fe47d91d0b9124e48814ded
-
SSDEEP
98304:Cf6hoGwhlxoORmkoq6LoTxHVo81F728I/e6KMMj9BZCloOhyNnh+IDQxb:avpeAZILoTFT1s8n9TfhdDQB
Malware Config
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral29/memory/812-85-0x0000000000AB0000-0x0000000000B52000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Executes dropped EXE 3 IoCs
pid Process 876 setup.tmp 3576 vpkaudioplayer.exe 812 vpkaudioplayer.exe -
Loads dropped DLL 1 IoCs
pid Process 876 setup.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 91.211.247.248 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpkaudioplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpkaudioplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 876 setup.tmp -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 208 wrote to memory of 876 208 setup.exe 84 PID 208 wrote to memory of 876 208 setup.exe 84 PID 208 wrote to memory of 876 208 setup.exe 84 PID 876 wrote to memory of 3576 876 setup.tmp 85 PID 876 wrote to memory of 3576 876 setup.tmp 85 PID 876 wrote to memory of 3576 876 setup.tmp 85 PID 876 wrote to memory of 812 876 setup.tmp 86 PID 876 wrote to memory of 812 876 setup.tmp 86 PID 876 wrote to memory of 812 876 setup.tmp 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe sh $MOZILLA\\nPLUGIN %SIGILL% "SIGTERM|DESTROY|SIGKILL"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\is-Q7TSU.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q7TSU.tmp\setup.tmp" /SL5="$9021E,4997647,54272,C:\Users\Admin\AppData\Local\Temp\setup.exe" sh $MOZILLA\\nPLUGIN %SIGILL% "SIGTERM|DESTROY|SIGKILL"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\VPK Audio Player\vpkaudioplayer.exe"C:\Users\Admin\AppData\Local\VPK Audio Player\vpkaudioplayer.exe" -i3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3576
-
-
C:\Users\Admin\AppData\Local\VPK Audio Player\vpkaudioplayer.exe"C:\Users\Admin\AppData\Local\VPK Audio Player\vpkaudioplayer.exe" -s3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
680KB
MD5c0c76b135dada6ca7bfa7f909d8c4d9b
SHA11142d8d15d68abc87ab39c3ef3f9d2dfa7615112
SHA256fba03e4d43d3fd94897cb65c1d0d4d6f851a5ba21a02bc343a8abe365d344770
SHA51249d44f28f4319e4e545f709abed52ed70462db179038d3ae31c182a3046d5d30ad151677104a5df33830c81998b8223090691e8f07f913a9ef3afeaaee011b7f
-
Filesize
4.0MB
MD5c1ebb045df9ea1406bd9e5bd7d989eb1
SHA145c9deaa50e8634088adfb64810d9f51af16975b
SHA256f09a1182c81d7306f666e901b8bb394fe6341d28ea7ec8bb1edc14a538a3d009
SHA512a9e00778114c1b5c83ec5ead7a97fef29392f22e2c827d0ac8bd11eb3d041a6e75ef1974655401b6ae4c8c65938608994da9af28c9becbefaf8bff7c3a9c49c1