General

  • Target

    2fa51aac78e5c9688685ee932d68817e92ad758924f13aadac154fa39662b1a2

  • Size

    5.0MB

  • Sample

    240629-bv3b8s1bqr

  • MD5

    0e58e1334e9652bb8b31531fa14c0b5b

  • SHA1

    baa5dc1bd1e821e705f82c309881b1c46d927545

  • SHA256

    2fa51aac78e5c9688685ee932d68817e92ad758924f13aadac154fa39662b1a2

  • SHA512

    71c109ec1901e38e42513e0d189d0dfd333a936361678f8b7a451e8ac2dce460cd3bff8fa2cd4b668949085f48a32d44f5049c66ba54c0ff99ffd9aca1c906a9

  • SSDEEP

    98304:Cc56Q43390CceS3DzGEqh0/K82YbiZrSyOCzj9fpIA0XpbRx3nQxg:J5679xceKDzvu0CBhdVjxOLXpbRtnQC

Malware Config

Targets

    • Target

      2fa51aac78e5c9688685ee932d68817e92ad758924f13aadac154fa39662b1a2

    • Size

      5.0MB

    • MD5

      0e58e1334e9652bb8b31531fa14c0b5b

    • SHA1

      baa5dc1bd1e821e705f82c309881b1c46d927545

    • SHA256

      2fa51aac78e5c9688685ee932d68817e92ad758924f13aadac154fa39662b1a2

    • SHA512

      71c109ec1901e38e42513e0d189d0dfd333a936361678f8b7a451e8ac2dce460cd3bff8fa2cd4b668949085f48a32d44f5049c66ba54c0ff99ffd9aca1c906a9

    • SSDEEP

      98304:Cc56Q43390CceS3DzGEqh0/K82YbiZrSyOCzj9fpIA0XpbRx3nQxg:J5679xceKDzvu0CBhdVjxOLXpbRtnQC

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks