General

  • Target

    ce4e3ca68c981a138b64bc1d2ef80ee3f1ef0b0a3c375b09540448ae670e2ba9

  • Size

    4.9MB

  • Sample

    240629-mbgrzayclr

  • MD5

    69bb01a23d5634c7585f84bf6484fbef

  • SHA1

    b9c54ebd5556d10371d2c6397f97209855e00e4f

  • SHA256

    ce4e3ca68c981a138b64bc1d2ef80ee3f1ef0b0a3c375b09540448ae670e2ba9

  • SHA512

    43d8c6e4759dba01e4142ee63ebb04f0665475c7c83653fef23c6c8ad3dfe0317cd41dfd3ffde1e728b8d5f3161dc2eaba948a3b7422153ee7f4edc4cc42b1bc

  • SSDEEP

    98304:CQihZf6BzBx0ecVgiYfIp8khajkMA8pnJX5JC+OsAFNlxoXu7BN0zzNQxV:ZiWt6OiYQJhajFnRHL4FN0XK0PNQH

Malware Config

Targets

    • Target

      ce4e3ca68c981a138b64bc1d2ef80ee3f1ef0b0a3c375b09540448ae670e2ba9

    • Size

      4.9MB

    • MD5

      69bb01a23d5634c7585f84bf6484fbef

    • SHA1

      b9c54ebd5556d10371d2c6397f97209855e00e4f

    • SHA256

      ce4e3ca68c981a138b64bc1d2ef80ee3f1ef0b0a3c375b09540448ae670e2ba9

    • SHA512

      43d8c6e4759dba01e4142ee63ebb04f0665475c7c83653fef23c6c8ad3dfe0317cd41dfd3ffde1e728b8d5f3161dc2eaba948a3b7422153ee7f4edc4cc42b1bc

    • SSDEEP

      98304:CQihZf6BzBx0ecVgiYfIp8khajkMA8pnJX5JC+OsAFNlxoXu7BN0zzNQxV:ZiWt6OiYQJhajFnRHL4FN0XK0PNQH

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks