General

  • Target

    303d7156e456dee739615749c35a9e746b7ad0099750242facfb2e959f49bfd3

  • Size

    5.4MB

  • Sample

    240630-q54qdascnn

  • MD5

    7d51f3c45583abd17287ec19c9ead4fe

  • SHA1

    1e4e0f57f38b6b79c7153c733a39d6c4ae88c970

  • SHA256

    303d7156e456dee739615749c35a9e746b7ad0099750242facfb2e959f49bfd3

  • SHA512

    470d9ce43d5ee7082c1ed37c9099e84ec483888a7c9bf422f6c8cc634cf11c9ec598bd583ee7d28cf0f54b15e86bc20af553a597302c34d8ba9148a962f25f6f

  • SSDEEP

    98304:C8qd+3ETmh8HPzo2X2JJ0KE1RDMHs+GkLaIzNRALseLjEmL/mU8/P9/33Qxv:NqdlE+zpXWkRDMHs+ZLjILDLjEqfG/nq

Malware Config

Targets

    • Target

      303d7156e456dee739615749c35a9e746b7ad0099750242facfb2e959f49bfd3

    • Size

      5.4MB

    • MD5

      7d51f3c45583abd17287ec19c9ead4fe

    • SHA1

      1e4e0f57f38b6b79c7153c733a39d6c4ae88c970

    • SHA256

      303d7156e456dee739615749c35a9e746b7ad0099750242facfb2e959f49bfd3

    • SHA512

      470d9ce43d5ee7082c1ed37c9099e84ec483888a7c9bf422f6c8cc634cf11c9ec598bd583ee7d28cf0f54b15e86bc20af553a597302c34d8ba9148a962f25f6f

    • SSDEEP

      98304:C8qd+3ETmh8HPzo2X2JJ0KE1RDMHs+GkLaIzNRALseLjEmL/mU8/P9/33Qxv:NqdlE+zpXWkRDMHs+ZLjILDLjEqfG/nq

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks