General

  • Target

    2c18826cc48cfef8066c330a57b9490829125520b3005c34965901fa45005f59

  • Size

    5.2MB

  • Sample

    240630-2mxpwsxgpf

  • MD5

    f4225d0924748c85d5644ad9ab2400c9

  • SHA1

    c14f30ee7bbb74486c2e9c60fd6f73e7a5a66355

  • SHA256

    2c18826cc48cfef8066c330a57b9490829125520b3005c34965901fa45005f59

  • SHA512

    e5879ed895fcb4a780357573d968877cc1056259e6d1ddd7886e5a565181281b418d85dbd3646b0f23d65a1ed212bea23de6254dc611c34c27789d0c299d1fcc

  • SSDEEP

    98304:CnpjZOpAVXbi5iJqWhDUftr0jESSpe0PTIJxl0k2LTAhMwGA5APScQx7:cpApSbAiJqWmZ08p6nl0B/AhM5GA/Qt

Malware Config

Targets

    • Target

      2c18826cc48cfef8066c330a57b9490829125520b3005c34965901fa45005f59

    • Size

      5.2MB

    • MD5

      f4225d0924748c85d5644ad9ab2400c9

    • SHA1

      c14f30ee7bbb74486c2e9c60fd6f73e7a5a66355

    • SHA256

      2c18826cc48cfef8066c330a57b9490829125520b3005c34965901fa45005f59

    • SHA512

      e5879ed895fcb4a780357573d968877cc1056259e6d1ddd7886e5a565181281b418d85dbd3646b0f23d65a1ed212bea23de6254dc611c34c27789d0c299d1fcc

    • SSDEEP

      98304:CnpjZOpAVXbi5iJqWhDUftr0jESSpe0PTIJxl0k2LTAhMwGA5APScQx7:cpApSbAiJqWmZ08p6nl0B/AhM5GA/Qt

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks