General

  • Target

    27102c0016f4ccf261e1435bb425529f870b4d70aa7aaf6bf4cb6ac947936b65

  • Size

    5.4MB

  • Sample

    240701-r4g1na1bqn

  • MD5

    905125b6587d252f281b0c843bcc1ea7

  • SHA1

    8966d0135b1374d44b4792c9320e89dbd3fc7c39

  • SHA256

    27102c0016f4ccf261e1435bb425529f870b4d70aa7aaf6bf4cb6ac947936b65

  • SHA512

    60499dc71906a3b5d290924070abacebdd7e304d841d3ad7233f9ec4a2d934da1e73f05f90350ae929403f3975d05c02f703ffdb4bac28e955b1ce28391a9768

  • SSDEEP

    98304:CpFF6uI2nefie4bZiGgnN0TSWnOdY4SUooxbuVtqMAebwM8LO++PBXiRFiUxijjo:Uf6uVnefi3ZiXwSWnMjooUVtaebwMqgi

Malware Config

Targets

    • Target

      27102c0016f4ccf261e1435bb425529f870b4d70aa7aaf6bf4cb6ac947936b65

    • Size

      5.4MB

    • MD5

      905125b6587d252f281b0c843bcc1ea7

    • SHA1

      8966d0135b1374d44b4792c9320e89dbd3fc7c39

    • SHA256

      27102c0016f4ccf261e1435bb425529f870b4d70aa7aaf6bf4cb6ac947936b65

    • SHA512

      60499dc71906a3b5d290924070abacebdd7e304d841d3ad7233f9ec4a2d934da1e73f05f90350ae929403f3975d05c02f703ffdb4bac28e955b1ce28391a9768

    • SSDEEP

      98304:CpFF6uI2nefie4bZiGgnN0TSWnOdY4SUooxbuVtqMAebwM8LO++PBXiRFiUxijjo:Uf6uVnefi3ZiXwSWnMjooUVtaebwMqgi

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks