General

  • Target

    4b625367c8965b0ff1676e97a7e96bb1131a1d11ed2ef4263d701adc80886795

  • Size

    4.9MB

  • Sample

    240701-fpscasxarc

  • MD5

    cd0ba9cf087f93c8a3c423241e8fead8

  • SHA1

    5b81c3185672e5d74e8480ab5797861bfa593315

  • SHA256

    4b625367c8965b0ff1676e97a7e96bb1131a1d11ed2ef4263d701adc80886795

  • SHA512

    f2202daf2eaa8179063002663415574653b7bcd78dceee2921e7778e8bcaf14cdde015c0425391872485409c5240e2bb1ee6aa5f5bb12740a22cbfc3ef88bc40

  • SSDEEP

    98304:CCQmysanRBNYbbLMywtFw1o9j6UErdjmqdeT29v0KiFhAtVwThlngDo2Na+nTQxu:omt0q/LMyk9wqqdy0sKiPAtVWhJgTtTD

Malware Config

Targets

    • Target

      4b625367c8965b0ff1676e97a7e96bb1131a1d11ed2ef4263d701adc80886795

    • Size

      4.9MB

    • MD5

      cd0ba9cf087f93c8a3c423241e8fead8

    • SHA1

      5b81c3185672e5d74e8480ab5797861bfa593315

    • SHA256

      4b625367c8965b0ff1676e97a7e96bb1131a1d11ed2ef4263d701adc80886795

    • SHA512

      f2202daf2eaa8179063002663415574653b7bcd78dceee2921e7778e8bcaf14cdde015c0425391872485409c5240e2bb1ee6aa5f5bb12740a22cbfc3ef88bc40

    • SSDEEP

      98304:CCQmysanRBNYbbLMywtFw1o9j6UErdjmqdeT29v0KiFhAtVwThlngDo2Na+nTQxu:omt0q/LMyk9wqqdy0sKiPAtVWhJgTtTD

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks