General

  • Target

    5f503b2fb90fa157628cdf3e17855b2c9c14379e04d974b84548892e7a718f2c

  • Size

    5.0MB

  • Sample

    240629-sm5wtsshrn

  • MD5

    9607296e62c05b9281a6bdc81ccb9099

  • SHA1

    6701d7ecd5d3b1e3ddd90122c7796e2ef7dd202f

  • SHA256

    5f503b2fb90fa157628cdf3e17855b2c9c14379e04d974b84548892e7a718f2c

  • SHA512

    23bb88bd663570e3335139d61cbb6f1603d4bfa2a63c7454bf1ce31e11d626180757c35524473ed87063523a116affe4b811cfe4ab23176724a7cbc571ddc027

  • SSDEEP

    98304:Clbjm1dKyldp2o8S/RWFSxL59pu3RCZ+kFqWSE6F+nkXzlqAav+7uGiv5DzvdqQ4:vqFSxL3qoZ+h/F+kNavkMFdqQ9a

Malware Config

Targets

    • Target

      5f503b2fb90fa157628cdf3e17855b2c9c14379e04d974b84548892e7a718f2c

    • Size

      5.0MB

    • MD5

      9607296e62c05b9281a6bdc81ccb9099

    • SHA1

      6701d7ecd5d3b1e3ddd90122c7796e2ef7dd202f

    • SHA256

      5f503b2fb90fa157628cdf3e17855b2c9c14379e04d974b84548892e7a718f2c

    • SHA512

      23bb88bd663570e3335139d61cbb6f1603d4bfa2a63c7454bf1ce31e11d626180757c35524473ed87063523a116affe4b811cfe4ab23176724a7cbc571ddc027

    • SSDEEP

      98304:Clbjm1dKyldp2o8S/RWFSxL59pu3RCZ+kFqWSE6F+nkXzlqAav+7uGiv5DzvdqQ4:vqFSxL3qoZ+h/F+kNavkMFdqQ9a

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks