General

  • Target

    1a666af2b0e8615ce67e8f4b1f28c5f3d96a4e936a4c42b44a6cd14a9e74df15

  • Size

    5.0MB

  • Sample

    240701-qs8tkaxgkn

  • MD5

    6800cf83fc712d760f1f622dde9ab4b8

  • SHA1

    8e92567d1432912a8e816a0eb209887fb1bc56be

  • SHA256

    1a666af2b0e8615ce67e8f4b1f28c5f3d96a4e936a4c42b44a6cd14a9e74df15

  • SHA512

    05a3d8f612dfa1527a99769793bde2df5aca918dbab0568292363b367efac9ff3179f02771eda2aac2cac6a5d93e2cbcc802ba8b77cb0abb3e85c869e9825c14

  • SSDEEP

    98304:C20o86ClWs8xPMv98hF1C5JAAG3WZSQbhOs9o1fWbbmSO7u7L8NT0elx9bQxle:P+WLI6hF85iD3WDhOaoEbku1qbQK

Malware Config

Targets

    • Target

      1a666af2b0e8615ce67e8f4b1f28c5f3d96a4e936a4c42b44a6cd14a9e74df15

    • Size

      5.0MB

    • MD5

      6800cf83fc712d760f1f622dde9ab4b8

    • SHA1

      8e92567d1432912a8e816a0eb209887fb1bc56be

    • SHA256

      1a666af2b0e8615ce67e8f4b1f28c5f3d96a4e936a4c42b44a6cd14a9e74df15

    • SHA512

      05a3d8f612dfa1527a99769793bde2df5aca918dbab0568292363b367efac9ff3179f02771eda2aac2cac6a5d93e2cbcc802ba8b77cb0abb3e85c869e9825c14

    • SSDEEP

      98304:C20o86ClWs8xPMv98hF1C5JAAG3WZSQbhOs9o1fWbbmSO7u7L8NT0elx9bQxle:P+WLI6hF85iD3WDhOaoEbku1qbQK

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks