General

  • Target

    66fea12d83e7baa8260970a440dfb14a2c3f5067a3f34c1578a96cdd7d24a6ce

  • Size

    5.1MB

  • Sample

    240630-13t39sxcjh

  • MD5

    46134264136026f19ab660312565cec5

  • SHA1

    3e1ece47db3f5bbc79be53bd061a9617c2ff7aab

  • SHA256

    66fea12d83e7baa8260970a440dfb14a2c3f5067a3f34c1578a96cdd7d24a6ce

  • SHA512

    1f1ee370bb5ff6ed546e74503699d7ec8626a965aad198cc804854f9aaa03cddd21e9ac17cb1a62ba58f6c7f7996ee6ca0c9abefb89f0d6a870bb05fc080a1f4

  • SSDEEP

    98304:CVPPPwuDyRU/6azIv9erpGlC4NRWzwexzoao7THiKs9RRKHDLmQx7:8PosyRU/jzIvQrpgHusexzHo7Zs9bKvX

Malware Config

Targets

    • Target

      66fea12d83e7baa8260970a440dfb14a2c3f5067a3f34c1578a96cdd7d24a6ce

    • Size

      5.1MB

    • MD5

      46134264136026f19ab660312565cec5

    • SHA1

      3e1ece47db3f5bbc79be53bd061a9617c2ff7aab

    • SHA256

      66fea12d83e7baa8260970a440dfb14a2c3f5067a3f34c1578a96cdd7d24a6ce

    • SHA512

      1f1ee370bb5ff6ed546e74503699d7ec8626a965aad198cc804854f9aaa03cddd21e9ac17cb1a62ba58f6c7f7996ee6ca0c9abefb89f0d6a870bb05fc080a1f4

    • SSDEEP

      98304:CVPPPwuDyRU/6azIv9erpGlC4NRWzwexzoao7THiKs9RRKHDLmQx7:8PosyRU/jzIvQrpgHusexzHo7Zs9bKvX

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks