General
-
Target
b42c724af5c05849434bb0c34cabbd138201a7f6b6b56faadbc150885cfd0a2e.exe
-
Size
2.0MB
-
Sample
250318-h9wlkawzfz
-
MD5
c0936b0b60581abf999cb8db58c887d6
-
SHA1
b6817af3e994b051935cfa2bdb7de674c5f7f949
-
SHA256
b42c724af5c05849434bb0c34cabbd138201a7f6b6b56faadbc150885cfd0a2e
-
SHA512
117d8f65c863db9c6514d17fff354a65c1faaee582fe630fb7713ae7f9cbc969013f0c17fe01fc763f0f42b3f090021fdca16672cde26a17038ba1b36584e094
-
SSDEEP
49152:32mReh8xhZ4DirVux6pKP79FS+iZM95cALWatNiCtQUOK+oR98:mmQab4Dq84oR0+4MQGHcWQqHR6
Static task
static1
Behavioral task
behavioral1
Sample
b42c724af5c05849434bb0c34cabbd138201a7f6b6b56faadbc150885cfd0a2e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b42c724af5c05849434bb0c34cabbd138201a7f6b6b56faadbc150885cfd0a2e.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
socks5systemz
csoazlp.net
http://csoazlp.net/search/?q=67e28dd83e55a37d1508fa1d7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4be8889b5e4fa9281ae978f071ea771795af8e05c642db22f31df92d8b38e316a667d307eca743ec4c2b07b52966923f658cf713c8e99c
http://csoazlp.net/search/?q=67e28dd83e55a37d1508fa1d7c27d78406abdd88be4b12eab517aa5c96bd86ec94804c815a8bbc896c58e713bc90c91e36b5281fc235a925ed3e53d6bd974a95129070b611e96cc92be20ea778c255bbe258b90d3b4eed3233d1626a8ff815c2ed9d9833cb66
bmhuieq.com
http://bmhuieq.com/search/?q=67e28dd8645df12f145cac4c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978a471ea771795af8e05c642db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608afd13c8ed9d9d39
Targets
-
-
Target
b42c724af5c05849434bb0c34cabbd138201a7f6b6b56faadbc150885cfd0a2e.exe
-
Size
2.0MB
-
MD5
c0936b0b60581abf999cb8db58c887d6
-
SHA1
b6817af3e994b051935cfa2bdb7de674c5f7f949
-
SHA256
b42c724af5c05849434bb0c34cabbd138201a7f6b6b56faadbc150885cfd0a2e
-
SHA512
117d8f65c863db9c6514d17fff354a65c1faaee582fe630fb7713ae7f9cbc969013f0c17fe01fc763f0f42b3f090021fdca16672cde26a17038ba1b36584e094
-
SSDEEP
49152:32mReh8xhZ4DirVux6pKP79FS+iZM95cALWatNiCtQUOK+oR98:mmQab4Dq84oR0+4MQGHcWQqHR6
Score10/10-
Detect Socks5Systemz Payload
-
Socks5systemz family
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-