General

  • Target

    185075db7d0312ff20dc0c2f2083cf273d0fe9fecb119ee9a706111d2f2cc94f

  • Size

    5.4MB

  • Sample

    240629-fsbtqa1gld

  • MD5

    44a008c0bfac8b7801ae12c1505bc536

  • SHA1

    f38c890f6557de88e0a8dd81f587ef13b829824d

  • SHA256

    185075db7d0312ff20dc0c2f2083cf273d0fe9fecb119ee9a706111d2f2cc94f

  • SHA512

    0d4201e95a50c00ebb97de127e4d9767dab90dc58d4bd3776a953a69a029c21509f256702f383633eb724191cc62c5a37c33aeacb4a18dbad129ba122a1d636b

  • SSDEEP

    98304:CELp6Dy71iMIBaJ0YRZaH1w6aiYhogGponAP0sEKJ/O5duSJjJEpYvXkZQxu:JkDg0Id+6h+mw/O5RtEi0ZQE

Malware Config

Targets

    • Target

      185075db7d0312ff20dc0c2f2083cf273d0fe9fecb119ee9a706111d2f2cc94f

    • Size

      5.4MB

    • MD5

      44a008c0bfac8b7801ae12c1505bc536

    • SHA1

      f38c890f6557de88e0a8dd81f587ef13b829824d

    • SHA256

      185075db7d0312ff20dc0c2f2083cf273d0fe9fecb119ee9a706111d2f2cc94f

    • SHA512

      0d4201e95a50c00ebb97de127e4d9767dab90dc58d4bd3776a953a69a029c21509f256702f383633eb724191cc62c5a37c33aeacb4a18dbad129ba122a1d636b

    • SSDEEP

      98304:CELp6Dy71iMIBaJ0YRZaH1w6aiYhogGponAP0sEKJ/O5duSJjJEpYvXkZQxu:JkDg0Id+6h+mw/O5RtEi0ZQE

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks