General

  • Target

    3f94a9b9420d34dbcbbfa0711be3c1db37cb36485579d6d2dfaf7b4f985f2b0d

  • Size

    5.0MB

  • Sample

    240630-k8y2eayfmr

  • MD5

    da865a85f3770bcc56f9957ca824050f

  • SHA1

    79233d9f70c96a65f641771dbfffb93f9ffd9770

  • SHA256

    3f94a9b9420d34dbcbbfa0711be3c1db37cb36485579d6d2dfaf7b4f985f2b0d

  • SHA512

    15eb7ab202abcf70df0fa632e16f23bd73b032c57d37fde33b1444c6a2a355aed041543605428e0a090ef528b4325e81fda9d3039185228c46bed1be55d05b50

  • SSDEEP

    98304:CRBYatio/bCoFB6Cnf3ufG5ddakHSh1lqluH6nJ3fEWs+ISCgXRyWoQxx:G/NTCoXf3ufGndaZPH6FC+ISCgXEQn

Malware Config

Targets

    • Target

      3f94a9b9420d34dbcbbfa0711be3c1db37cb36485579d6d2dfaf7b4f985f2b0d

    • Size

      5.0MB

    • MD5

      da865a85f3770bcc56f9957ca824050f

    • SHA1

      79233d9f70c96a65f641771dbfffb93f9ffd9770

    • SHA256

      3f94a9b9420d34dbcbbfa0711be3c1db37cb36485579d6d2dfaf7b4f985f2b0d

    • SHA512

      15eb7ab202abcf70df0fa632e16f23bd73b032c57d37fde33b1444c6a2a355aed041543605428e0a090ef528b4325e81fda9d3039185228c46bed1be55d05b50

    • SSDEEP

      98304:CRBYatio/bCoFB6Cnf3ufG5ddakHSh1lqluH6nJ3fEWs+ISCgXRyWoQxx:G/NTCoXf3ufGndaZPH6FC+ISCgXEQn

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks