General

  • Target

    7537cb9e6066714aa3cc34688da50fc479296a78c5fc116edfdee46633c2d03b

  • Size

    5.1MB

  • Sample

    240630-arw6datfkk

  • MD5

    c37e00474668f9991f0bd4692e24b0a9

  • SHA1

    6ccba44f2b098ed5f5622187c8f5732c62db7d61

  • SHA256

    7537cb9e6066714aa3cc34688da50fc479296a78c5fc116edfdee46633c2d03b

  • SHA512

    268f0b64d4ad33f292f21283cacf6e21cd9633f2caa705e72c6c78acfece5b7db8a33d4e2835f33aa3e5b49c658ee8776f9ead44acd7f05c50a53dc1269b9d0b

  • SSDEEP

    98304:CkjOeC0qj7hoBj0YKiVt8srQIkdXALIgA8wgp+3+UsPhx917C3Qx9W:tjApoBdLtdQJALIgdwgWgUQa

Malware Config

Targets

    • Target

      7537cb9e6066714aa3cc34688da50fc479296a78c5fc116edfdee46633c2d03b

    • Size

      5.1MB

    • MD5

      c37e00474668f9991f0bd4692e24b0a9

    • SHA1

      6ccba44f2b098ed5f5622187c8f5732c62db7d61

    • SHA256

      7537cb9e6066714aa3cc34688da50fc479296a78c5fc116edfdee46633c2d03b

    • SHA512

      268f0b64d4ad33f292f21283cacf6e21cd9633f2caa705e72c6c78acfece5b7db8a33d4e2835f33aa3e5b49c658ee8776f9ead44acd7f05c50a53dc1269b9d0b

    • SSDEEP

      98304:CkjOeC0qj7hoBj0YKiVt8srQIkdXALIgA8wgp+3+UsPhx917C3Qx9W:tjApoBdLtdQJALIgdwgWgUQa

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks