General

  • Target

    76e7619afe9665f9d0d7571dcecfdd420ccaaf66c9a2a867657bb18432b03535

  • Size

    5.0MB

  • Sample

    240628-qeskestglm

  • MD5

    6859550f89b2bb31b245bd4f2d3635f8

  • SHA1

    02d092e54e8e6e35c08f62054ff501a116b2ec66

  • SHA256

    76e7619afe9665f9d0d7571dcecfdd420ccaaf66c9a2a867657bb18432b03535

  • SHA512

    adaad4627f88cc770cf426de308150a77ca5e7303cc183699be8a52f11973bc350580849c96b140703584e411d7eded9cbaeb7faee4c9fbe5cbf0a1dc474defa

  • SSDEEP

    98304:CerLJPINIVBqvOVc0jyhVeSt6lRb8VddJ621ljzWNGI3QQxj:lLJP7QvP0jMoSwRAD62nWI4QQh

Malware Config

Targets

    • Target

      76e7619afe9665f9d0d7571dcecfdd420ccaaf66c9a2a867657bb18432b03535

    • Size

      5.0MB

    • MD5

      6859550f89b2bb31b245bd4f2d3635f8

    • SHA1

      02d092e54e8e6e35c08f62054ff501a116b2ec66

    • SHA256

      76e7619afe9665f9d0d7571dcecfdd420ccaaf66c9a2a867657bb18432b03535

    • SHA512

      adaad4627f88cc770cf426de308150a77ca5e7303cc183699be8a52f11973bc350580849c96b140703584e411d7eded9cbaeb7faee4c9fbe5cbf0a1dc474defa

    • SSDEEP

      98304:CerLJPINIVBqvOVc0jyhVeSt6lRb8VddJ621ljzWNGI3QQxj:lLJP7QvP0jMoSwRAD62nWI4QQh

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks