General

  • Target

    b70aede978fe732b1a9c16615971ecb5e3959edcc96156431f5fbf6c4593c092

  • Size

    5.0MB

  • Sample

    240701-p1kw2awbpm

  • MD5

    966614786da27d7102628c9fab78adea

  • SHA1

    cfdee9b518863d4aa2068e242e2bf1640e6886cf

  • SHA256

    b70aede978fe732b1a9c16615971ecb5e3959edcc96156431f5fbf6c4593c092

  • SHA512

    f65d9f3e4244758fc71b3fb5ff61be529d31d6e24a5b25f62325ed1b0c2399825110f3887638bb19f2e163b67e46973027d1e3c9a92a51ef920caf07396cd331

  • SSDEEP

    98304:CW4fU/YRiA7XMmuALuFiyjfaAXKt33eLm6gPXKQdEPIBz4KWS60Gtwe5wQxle:J4+Q7X1L2iefaWKtHX6gPCPIN4KWSytm

Malware Config

Targets

    • Target

      b70aede978fe732b1a9c16615971ecb5e3959edcc96156431f5fbf6c4593c092

    • Size

      5.0MB

    • MD5

      966614786da27d7102628c9fab78adea

    • SHA1

      cfdee9b518863d4aa2068e242e2bf1640e6886cf

    • SHA256

      b70aede978fe732b1a9c16615971ecb5e3959edcc96156431f5fbf6c4593c092

    • SHA512

      f65d9f3e4244758fc71b3fb5ff61be529d31d6e24a5b25f62325ed1b0c2399825110f3887638bb19f2e163b67e46973027d1e3c9a92a51ef920caf07396cd331

    • SSDEEP

      98304:CW4fU/YRiA7XMmuALuFiyjfaAXKt33eLm6gPXKQdEPIBz4KWS60Gtwe5wQxle:J4+Q7X1L2iefaWKtHX6gPCPIN4KWSytm

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks