General

  • Target

    8dd76a2e45c5759e7c881297e2f09c5218583a4c54d940f51e72618a8e013a5e

  • Size

    4.9MB

  • Sample

    240701-fq6lbazgrp

  • MD5

    dc3bc0c375f9ea296786f090a48077b3

  • SHA1

    f1c2ea05b28912fe631fa85fe35f730b1dd909a8

  • SHA256

    8dd76a2e45c5759e7c881297e2f09c5218583a4c54d940f51e72618a8e013a5e

  • SHA512

    69464701f2fe85aa517ca53251b796d3eed267af9255fba9b4c87aca70d59b9a42665fac0390783fadb046642d32d45375743c34e415c0397906419a503f508a

  • SSDEEP

    98304:C3fwhy97//NcOD/yUFAgN3QPycoTrCzRFAQ+cqpk/do2xNInrhZQxg:8uarljRAgN3myoFJ+cv/do2xNInrnQC

Malware Config

Targets

    • Target

      8dd76a2e45c5759e7c881297e2f09c5218583a4c54d940f51e72618a8e013a5e

    • Size

      4.9MB

    • MD5

      dc3bc0c375f9ea296786f090a48077b3

    • SHA1

      f1c2ea05b28912fe631fa85fe35f730b1dd909a8

    • SHA256

      8dd76a2e45c5759e7c881297e2f09c5218583a4c54d940f51e72618a8e013a5e

    • SHA512

      69464701f2fe85aa517ca53251b796d3eed267af9255fba9b4c87aca70d59b9a42665fac0390783fadb046642d32d45375743c34e415c0397906419a503f508a

    • SSDEEP

      98304:C3fwhy97//NcOD/yUFAgN3QPycoTrCzRFAQ+cqpk/do2xNInrhZQxg:8uarljRAgN3myoFJ+cv/do2xNInrnQC

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks