General

  • Target

    c0d94d02effe02b4daf6bbabad32b4f0a0aa2e998d93751f3f36e9ebdb78d24a

  • Size

    5.2MB

  • Sample

    240701-jax6sasepn

  • MD5

    41a43bb74e6bb55151ac4aaca3d2fc90

  • SHA1

    8a76d9d4adb077af913198e3c665a655cc142711

  • SHA256

    c0d94d02effe02b4daf6bbabad32b4f0a0aa2e998d93751f3f36e9ebdb78d24a

  • SHA512

    c6d45ecc36333a0661759551db1da6fa46daf734ad02557e4f4ce879fb8354a7547dd4a5dbe4b1eda068469904160139f4b923c3aa50cd8723b7041c5e61feb4

  • SSDEEP

    98304:C5bNM7Ps6fPWg2DQdUAMybo17emAXYqEMKDbjNso2EL9hmhqQxt:axM7Rnt2DWUAVo17e/Y5jWo2oh6qQ7

Malware Config

Targets

    • Target

      c0d94d02effe02b4daf6bbabad32b4f0a0aa2e998d93751f3f36e9ebdb78d24a

    • Size

      5.2MB

    • MD5

      41a43bb74e6bb55151ac4aaca3d2fc90

    • SHA1

      8a76d9d4adb077af913198e3c665a655cc142711

    • SHA256

      c0d94d02effe02b4daf6bbabad32b4f0a0aa2e998d93751f3f36e9ebdb78d24a

    • SHA512

      c6d45ecc36333a0661759551db1da6fa46daf734ad02557e4f4ce879fb8354a7547dd4a5dbe4b1eda068469904160139f4b923c3aa50cd8723b7041c5e61feb4

    • SSDEEP

      98304:C5bNM7Ps6fPWg2DQdUAMybo17emAXYqEMKDbjNso2EL9hmhqQxt:axM7Rnt2DWUAVo17e/Y5jWo2oh6qQ7

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks