General

  • Target

    2054d2a6d946d2d3e204f33e1f6020a20ee4000f341e1d7d1305ccb2a3801eb9

  • Size

    5.0MB

  • Sample

    240629-az5gqazclp

  • MD5

    258efdf838ee832fe5114fc95be37df3

  • SHA1

    747ea06155f47ee449ec6a7214d09b6f0c65fa35

  • SHA256

    2054d2a6d946d2d3e204f33e1f6020a20ee4000f341e1d7d1305ccb2a3801eb9

  • SHA512

    cd20bcbda45040c66abe93713cf2af08b396d7f2c9d3fadcde0209ef7d3f2964731ac1bf15d41ce8c954db523816ff60c129efd07d118bf448591a5f0dc88022

  • SSDEEP

    98304:CQPoDWWgk8cuyuw/yx3A+7GV6P57CCiORnqQKitATwuwa4ziX9Wv/lQC8mmeFPiJ:jPoydem3x7w6P5+C5qitATwuwa4zy9W8

Malware Config

Targets

    • Target

      2054d2a6d946d2d3e204f33e1f6020a20ee4000f341e1d7d1305ccb2a3801eb9

    • Size

      5.0MB

    • MD5

      258efdf838ee832fe5114fc95be37df3

    • SHA1

      747ea06155f47ee449ec6a7214d09b6f0c65fa35

    • SHA256

      2054d2a6d946d2d3e204f33e1f6020a20ee4000f341e1d7d1305ccb2a3801eb9

    • SHA512

      cd20bcbda45040c66abe93713cf2af08b396d7f2c9d3fadcde0209ef7d3f2964731ac1bf15d41ce8c954db523816ff60c129efd07d118bf448591a5f0dc88022

    • SSDEEP

      98304:CQPoDWWgk8cuyuw/yx3A+7GV6P57CCiORnqQKitATwuwa4ziX9Wv/lQC8mmeFPiJ:jPoydem3x7w6P5+C5qitATwuwa4zy9W8

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks