General
-
Target
6b251b357a4ff2ff8fc367c082918f11872bcfc6ba6b69059c0d876de53337a7.exe
-
Size
4.0MB
-
Sample
250318-fagl9avtax
-
MD5
a83fa5bb02751dbfa327f9ab06dca6df
-
SHA1
f16ae580b52c611b0666f26a27f2027b111ee181
-
SHA256
6b251b357a4ff2ff8fc367c082918f11872bcfc6ba6b69059c0d876de53337a7
-
SHA512
4a8e582439deedac82ff5dce0737b55a5d5b4e870a9683a7879c58602777d76fb84a34b3d5c062e71cdfeaccbe1b3fa125e6f803dfb7be1dac0efea70b44f4b6
-
SSDEEP
98304:CjOPRTI3Nar3fLobbeVfnGkSVqDWmbnsazR/7/qKwPLBzI21xQxE:DNIe3k/eVvGxUDdZ/q1LBMOxQG
Static task
static1
Behavioral task
behavioral1
Sample
6b251b357a4ff2ff8fc367c082918f11872bcfc6ba6b69059c0d876de53337a7.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6b251b357a4ff2ff8fc367c082918f11872bcfc6ba6b69059c0d876de53337a7.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
socks5systemz
digciwz.info
http://digciwz.info/search/?q=67e28dd86c0ba1284009f91c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f171ea771795af8e05c645db22f31df92d8b38e316a667d307eca743ec4c2b07b52966923f658cf813c8e895
http://digciwz.info/search/?q=67e28dd86c0ba1284009f91c7c27d78406abdd88be4b12eab517aa5c96bd86e596834496148ab2865b77f80ebad9c40f7cb63037ed2ab423a4344383ba915d911ec07bb606a0708720fa11b861c353baf51aba1e7242fa7023cc366689fb13c2e897923ccd
buoihlp.com
http://buoihlp.com/search/?q=67e28dd86b5bf57d470baa197c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa49e8889b5e4fa9281ae978ff71ea771795af8e05c645db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608afd13c7ed9d9c38
Targets
-
-
Target
6b251b357a4ff2ff8fc367c082918f11872bcfc6ba6b69059c0d876de53337a7.exe
-
Size
4.0MB
-
MD5
a83fa5bb02751dbfa327f9ab06dca6df
-
SHA1
f16ae580b52c611b0666f26a27f2027b111ee181
-
SHA256
6b251b357a4ff2ff8fc367c082918f11872bcfc6ba6b69059c0d876de53337a7
-
SHA512
4a8e582439deedac82ff5dce0737b55a5d5b4e870a9683a7879c58602777d76fb84a34b3d5c062e71cdfeaccbe1b3fa125e6f803dfb7be1dac0efea70b44f4b6
-
SSDEEP
98304:CjOPRTI3Nar3fLobbeVfnGkSVqDWmbnsazR/7/qKwPLBzI21xQxE:DNIe3k/eVvGxUDdZ/q1LBMOxQG
Score10/10-
Detect Socks5Systemz Payload
-
Socks5systemz family
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-