General

  • Target

    d77ec6c3f8366e7fd6581e6771bdac0eb07684926d64cd292147e6df8c07e837

  • Size

    5.1MB

  • Sample

    240629-tfmbks1arb

  • MD5

    cd7a12ee324866ddbc982b2742aa3e47

  • SHA1

    6100aa5b081a9d99153c8642899775c95399f20c

  • SHA256

    d77ec6c3f8366e7fd6581e6771bdac0eb07684926d64cd292147e6df8c07e837

  • SHA512

    a7cdd984cc3fb9fa6119bc8829611c20f168141f6822c52abcd870e5edd8ee3c2d3e6d6c7d4b0345533b44d20395e14ceac286635df83cc965c584055aeed735

  • SSDEEP

    98304:CMRNFPsIaE/mPjPTxjPiTr5L64EeUv2iIpJnlMvVecRhCNU5wFDa9gjo+EtGUNFP:1XFkIa/xjaTlL6zrnrKl2cet90ABFH5j

Malware Config

Targets

    • Target

      d77ec6c3f8366e7fd6581e6771bdac0eb07684926d64cd292147e6df8c07e837

    • Size

      5.1MB

    • MD5

      cd7a12ee324866ddbc982b2742aa3e47

    • SHA1

      6100aa5b081a9d99153c8642899775c95399f20c

    • SHA256

      d77ec6c3f8366e7fd6581e6771bdac0eb07684926d64cd292147e6df8c07e837

    • SHA512

      a7cdd984cc3fb9fa6119bc8829611c20f168141f6822c52abcd870e5edd8ee3c2d3e6d6c7d4b0345533b44d20395e14ceac286635df83cc965c584055aeed735

    • SSDEEP

      98304:CMRNFPsIaE/mPjPTxjPiTr5L64EeUv2iIpJnlMvVecRhCNU5wFDa9gjo+EtGUNFP:1XFkIa/xjaTlL6zrnrKl2cet90ABFH5j

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks