General

  • Target

    11ccdd4ae4c8a7155df282c9e8e088fcefdfc962d1419be8bdb64392ebe4e4d9

  • Size

    5.1MB

  • Sample

    240628-t7g6yawhmf

  • MD5

    629d9eed37b48ffbabbea8d2de0b1a09

  • SHA1

    2564684b0f54c5da67e4d9c3e33ef9418e6da433

  • SHA256

    11ccdd4ae4c8a7155df282c9e8e088fcefdfc962d1419be8bdb64392ebe4e4d9

  • SHA512

    9d55fe9076b8e1da026e05f255ec96e4e37ce06754e003358eda1f17b1ee4d2a30101106b43a0c5ff5ca04dc0813b585c777dcd96906a955c3a4448febf570bf

  • SSDEEP

    98304:CL5SJbsCBKcxCwzSJXnJMP4mSXwiA3cJ34/zkeOnP5zp+k8VZqkkseJM0PUQxg:iMBCJMwDwiwccZcJpYtkxy0sQC

Malware Config

Targets

    • Target

      11ccdd4ae4c8a7155df282c9e8e088fcefdfc962d1419be8bdb64392ebe4e4d9

    • Size

      5.1MB

    • MD5

      629d9eed37b48ffbabbea8d2de0b1a09

    • SHA1

      2564684b0f54c5da67e4d9c3e33ef9418e6da433

    • SHA256

      11ccdd4ae4c8a7155df282c9e8e088fcefdfc962d1419be8bdb64392ebe4e4d9

    • SHA512

      9d55fe9076b8e1da026e05f255ec96e4e37ce06754e003358eda1f17b1ee4d2a30101106b43a0c5ff5ca04dc0813b585c777dcd96906a955c3a4448febf570bf

    • SSDEEP

      98304:CL5SJbsCBKcxCwzSJXnJMP4mSXwiA3cJ34/zkeOnP5zp+k8VZqkkseJM0PUQxg:iMBCJMwDwiwccZcJpYtkxy0sQC

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks