General

  • Target

    f39187bcee5bd2859b3ecdd4810e5b7e480a95d8b150f387b962b770e9ad98ac

  • Size

    4.9MB

  • Sample

    240628-3ysezswakb

  • MD5

    8304f13e857cc4d90fb4a3a95b0b23ed

  • SHA1

    c8d0f55b26b4111470be204dc6e033a6c1e4713e

  • SHA256

    f39187bcee5bd2859b3ecdd4810e5b7e480a95d8b150f387b962b770e9ad98ac

  • SHA512

    fe9b05be08b6ba8dee8c5c22f94dbc7f2db3003fc132742b37c82757d16e02c9924417226c999f891714eabc821694d248216e6f3d03ec0a26dac1195e61ba8a

  • SSDEEP

    98304:C7B6dvSyTp3XAMiB4Ck7Ti7smLVt/bnpnnPnyzWFH7w0V49vx8r/aQxg:A6cyTZwMiBbceTpnPyzW1cF8r/aQC

Malware Config

Targets

    • Target

      f39187bcee5bd2859b3ecdd4810e5b7e480a95d8b150f387b962b770e9ad98ac

    • Size

      4.9MB

    • MD5

      8304f13e857cc4d90fb4a3a95b0b23ed

    • SHA1

      c8d0f55b26b4111470be204dc6e033a6c1e4713e

    • SHA256

      f39187bcee5bd2859b3ecdd4810e5b7e480a95d8b150f387b962b770e9ad98ac

    • SHA512

      fe9b05be08b6ba8dee8c5c22f94dbc7f2db3003fc132742b37c82757d16e02c9924417226c999f891714eabc821694d248216e6f3d03ec0a26dac1195e61ba8a

    • SSDEEP

      98304:C7B6dvSyTp3XAMiB4Ck7Ti7smLVt/bnpnnPnyzWFH7w0V49vx8r/aQxg:A6cyTZwMiBbceTpnPyzW1cF8r/aQC

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks