General

  • Target

    934b8b37253b4fd917341a9cbbe4de637029976cdc0b9fcd8f6bf6ebd6d6ff9e

  • Size

    5.0MB

  • Sample

    240630-yr8q6sxcnq

  • MD5

    b3b273fa4583dee1921c32a74411ccc6

  • SHA1

    d49ab54194003ba661a3ce869c382ce884b25d6f

  • SHA256

    934b8b37253b4fd917341a9cbbe4de637029976cdc0b9fcd8f6bf6ebd6d6ff9e

  • SHA512

    af411b6324d4dd6453e6cdaccafde88c84f7e3a4f71b317346f8b9f19e7943cf4a1e77c71a06aa69a5b77ee853c8b6397f896098010150892d40f204f59ed052

  • SSDEEP

    98304:C8i8LiFgWNzuFctJbkWuHc5Rguy/QvDc6lelSq0gNa9PyurCrAWUZQQx7:zggWNzuFc7k5HQvDc6YlSqddpUaQt

Malware Config

Targets

    • Target

      934b8b37253b4fd917341a9cbbe4de637029976cdc0b9fcd8f6bf6ebd6d6ff9e

    • Size

      5.0MB

    • MD5

      b3b273fa4583dee1921c32a74411ccc6

    • SHA1

      d49ab54194003ba661a3ce869c382ce884b25d6f

    • SHA256

      934b8b37253b4fd917341a9cbbe4de637029976cdc0b9fcd8f6bf6ebd6d6ff9e

    • SHA512

      af411b6324d4dd6453e6cdaccafde88c84f7e3a4f71b317346f8b9f19e7943cf4a1e77c71a06aa69a5b77ee853c8b6397f896098010150892d40f204f59ed052

    • SSDEEP

      98304:C8i8LiFgWNzuFctJbkWuHc5Rguy/QvDc6lelSq0gNa9PyurCrAWUZQQx7:zggWNzuFc7k5HQvDc6YlSqddpUaQt

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks