General

  • Target

    8121657a2ddd153ff7f7eedf4ea7f6e96976628ee27ca9818285814463c5956d

  • Size

    5.1MB

  • Sample

    240629-gkmfxssckb

  • MD5

    326ead0c53755bc7859b3b0bf6a449f8

  • SHA1

    e151a6f7a9b6da5d0670dabdd1346d878c575f14

  • SHA256

    8121657a2ddd153ff7f7eedf4ea7f6e96976628ee27ca9818285814463c5956d

  • SHA512

    63134c36fa3330bd31ca42c9c5a83aff660016b4025878dd4030b5969384be623e7d38e6ee1683e4d3875666564ef1cf8b9bf92d338885fc8810e808fa2f6992

  • SSDEEP

    98304:CMycSTpTZnZUfN+K3hrNcPLxKX6tkrVBwdmF++q9nYx6H62rv5wgjWMGfqQxq:ABtTZnSfNb3PYxKXhrrz+5prBgqQQ

Malware Config

Targets

    • Target

      8121657a2ddd153ff7f7eedf4ea7f6e96976628ee27ca9818285814463c5956d

    • Size

      5.1MB

    • MD5

      326ead0c53755bc7859b3b0bf6a449f8

    • SHA1

      e151a6f7a9b6da5d0670dabdd1346d878c575f14

    • SHA256

      8121657a2ddd153ff7f7eedf4ea7f6e96976628ee27ca9818285814463c5956d

    • SHA512

      63134c36fa3330bd31ca42c9c5a83aff660016b4025878dd4030b5969384be623e7d38e6ee1683e4d3875666564ef1cf8b9bf92d338885fc8810e808fa2f6992

    • SSDEEP

      98304:CMycSTpTZnZUfN+K3hrNcPLxKX6tkrVBwdmF++q9nYx6H62rv5wgjWMGfqQxq:ABtTZnSfNb3PYxKXhrrz+5prBgqQQ

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks