General

  • Target

    058ada79dc881b570ed1e2f336682798d04c129100419febd505964152c5b6ff

  • Size

    5.0MB

  • Sample

    240629-13apmaxend

  • MD5

    f861eab97d34bf67c417cc32cfb66221

  • SHA1

    bc5e4d1116d7e9d2f7d9206eadeb706279a7a6e1

  • SHA256

    058ada79dc881b570ed1e2f336682798d04c129100419febd505964152c5b6ff

  • SHA512

    6b0d0abae61af5178d000ccb22e63c77c5e3a4e4f0420a42932b6bb0bb110b5096cbc40422c44173dda9f6721b6afd55be0adc4899f8a985776425f4f810b796

  • SSDEEP

    98304:C5d6AFGWPc7BZdX3G4TMYAkv5PYRAM0sjde/EnDPoQx9W:Ad6EBPc7dHMYvxPXDsjItQa

Malware Config

Targets

    • Target

      058ada79dc881b570ed1e2f336682798d04c129100419febd505964152c5b6ff

    • Size

      5.0MB

    • MD5

      f861eab97d34bf67c417cc32cfb66221

    • SHA1

      bc5e4d1116d7e9d2f7d9206eadeb706279a7a6e1

    • SHA256

      058ada79dc881b570ed1e2f336682798d04c129100419febd505964152c5b6ff

    • SHA512

      6b0d0abae61af5178d000ccb22e63c77c5e3a4e4f0420a42932b6bb0bb110b5096cbc40422c44173dda9f6721b6afd55be0adc4899f8a985776425f4f810b796

    • SSDEEP

      98304:C5d6AFGWPc7BZdX3G4TMYAkv5PYRAM0sjde/EnDPoQx9W:Ad6EBPc7dHMYvxPXDsjItQa

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks