General

  • Target

    7003955ecf680f532cd7c79b5ba5137245bd3eb6885f0cf7d1f46555b31a7610

  • Size

    5.0MB

  • Sample

    240701-e7y25azcpq

  • MD5

    12f8802d77ddee1553c1c097eb6d266b

  • SHA1

    c48fa0413a77f532994d7106128867a962dd398b

  • SHA256

    7003955ecf680f532cd7c79b5ba5137245bd3eb6885f0cf7d1f46555b31a7610

  • SHA512

    bbb87008eb99ad573dcbe0d8cf988c4a04cf98ac7e5d169e2dfc800f9702f2cfe18d4b648b735e574118d7a66095aa69b8fb8450f7a1b89ef790e69fed7d0530

  • SSDEEP

    98304:CCExNIonYBwFHWf476mnbtRKKnMhsDW3PVI6sCwZ+keFQxe:7iNYBwF2f47DtRfMaDOszZ+dQY

Malware Config

Targets

    • Target

      7003955ecf680f532cd7c79b5ba5137245bd3eb6885f0cf7d1f46555b31a7610

    • Size

      5.0MB

    • MD5

      12f8802d77ddee1553c1c097eb6d266b

    • SHA1

      c48fa0413a77f532994d7106128867a962dd398b

    • SHA256

      7003955ecf680f532cd7c79b5ba5137245bd3eb6885f0cf7d1f46555b31a7610

    • SHA512

      bbb87008eb99ad573dcbe0d8cf988c4a04cf98ac7e5d169e2dfc800f9702f2cfe18d4b648b735e574118d7a66095aa69b8fb8450f7a1b89ef790e69fed7d0530

    • SSDEEP

      98304:CCExNIonYBwFHWf476mnbtRKKnMhsDW3PVI6sCwZ+keFQxe:7iNYBwF2f47DtRfMaDOszZ+dQY

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks