General

  • Target

    57dad3187e1c39853d0eb5799bd796d5a90a4affc736a4bfa6f74834d5723ac9

  • Size

    5.0MB

  • Sample

    240701-ahzj5stbrp

  • MD5

    30d334bb3b5ad03a83a9c1f81a667b02

  • SHA1

    907fa28f3f8cdb20b446cc54a870ee1b315411a3

  • SHA256

    57dad3187e1c39853d0eb5799bd796d5a90a4affc736a4bfa6f74834d5723ac9

  • SHA512

    2a61d3835929448a26ee909e2b006df1e8aa54114102c3c6139c52c94adf06fbc226d420c43526c8840ce6d311839859c0f52fc8392f736d391616f291265af3

  • SSDEEP

    98304:CHMn6VJL64EkTvvJI6vIN+zVsGx1vM/ab/01QzwMeyIT85tQx7:Fn6HLSkTek2GxqybZ8f5TatQt

Malware Config

Targets

    • Target

      57dad3187e1c39853d0eb5799bd796d5a90a4affc736a4bfa6f74834d5723ac9

    • Size

      5.0MB

    • MD5

      30d334bb3b5ad03a83a9c1f81a667b02

    • SHA1

      907fa28f3f8cdb20b446cc54a870ee1b315411a3

    • SHA256

      57dad3187e1c39853d0eb5799bd796d5a90a4affc736a4bfa6f74834d5723ac9

    • SHA512

      2a61d3835929448a26ee909e2b006df1e8aa54114102c3c6139c52c94adf06fbc226d420c43526c8840ce6d311839859c0f52fc8392f736d391616f291265af3

    • SSDEEP

      98304:CHMn6VJL64EkTvvJI6vIN+zVsGx1vM/ab/01QzwMeyIT85tQx7:Fn6HLSkTek2GxqybZ8f5TatQt

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks