General

  • Target

    dc0685e5ea723654ae43363a68e85f309b8ee74fdccf18ee94552f01d06e37c3

  • Size

    5.0MB

  • Sample

    240629-p3a5ls1bmk

  • MD5

    208d0eaff80216e42fc09c756d6b3057

  • SHA1

    f90df38cd84c484a9d030470944576c6aa8ffab4

  • SHA256

    dc0685e5ea723654ae43363a68e85f309b8ee74fdccf18ee94552f01d06e37c3

  • SHA512

    224aafdbd47289035ec83af36564644bf68b9d95a58df6b067eac99df279eb341f3d8a3fe73f4c66442e86ca8b444d15b8b949a6695c57fe3a55b6c1615bf32c

  • SSDEEP

    98304:CfIcO94dHOPGS26vVytpbRAsabNjvC3+cP4/EVKrT67yBQx+t:4IcO9sHO+l6vYthGsabhCua4/EVKrJQY

Malware Config

Targets

    • Target

      dc0685e5ea723654ae43363a68e85f309b8ee74fdccf18ee94552f01d06e37c3

    • Size

      5.0MB

    • MD5

      208d0eaff80216e42fc09c756d6b3057

    • SHA1

      f90df38cd84c484a9d030470944576c6aa8ffab4

    • SHA256

      dc0685e5ea723654ae43363a68e85f309b8ee74fdccf18ee94552f01d06e37c3

    • SHA512

      224aafdbd47289035ec83af36564644bf68b9d95a58df6b067eac99df279eb341f3d8a3fe73f4c66442e86ca8b444d15b8b949a6695c57fe3a55b6c1615bf32c

    • SSDEEP

      98304:CfIcO94dHOPGS26vVytpbRAsabNjvC3+cP4/EVKrT67yBQx+t:4IcO9sHO+l6vYthGsabhCua4/EVKrJQY

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks