General

  • Target

    9af2d697f3d522c58699bced07ecfb2eb7c5623e2767fba3626fcca7cc1e5652

  • Size

    5.1MB

  • Sample

    240701-xnpy8axgpj

  • MD5

    084206f8a2da42650f43f9e7f8b9637c

  • SHA1

    eb4c2d83f238c11a1f14dcb15196084521dc1df2

  • SHA256

    9af2d697f3d522c58699bced07ecfb2eb7c5623e2767fba3626fcca7cc1e5652

  • SHA512

    7c49fa10df23e73d7cb4045606266a0985ac3eefbf54c522220f0e5563508c776dba2985b4bdb5735bcc591f93bb01b15935edf2e865e16f49a329880448c675

  • SSDEEP

    98304:CGdOA4Di92asc8zOc5TfARThpGFK6WZYizIvWulzJ836pWqNzgbiYVw7FQLQxy:VdOSjvc5TfCpGF7WZx+zJ83qW2XR7FY1

Malware Config

Targets

    • Target

      9af2d697f3d522c58699bced07ecfb2eb7c5623e2767fba3626fcca7cc1e5652

    • Size

      5.1MB

    • MD5

      084206f8a2da42650f43f9e7f8b9637c

    • SHA1

      eb4c2d83f238c11a1f14dcb15196084521dc1df2

    • SHA256

      9af2d697f3d522c58699bced07ecfb2eb7c5623e2767fba3626fcca7cc1e5652

    • SHA512

      7c49fa10df23e73d7cb4045606266a0985ac3eefbf54c522220f0e5563508c776dba2985b4bdb5735bcc591f93bb01b15935edf2e865e16f49a329880448c675

    • SSDEEP

      98304:CGdOA4Di92asc8zOc5TfARThpGFK6WZYizIvWulzJ836pWqNzgbiYVw7FQLQxy:VdOSjvc5TfCpGF7WZx+zJ83qW2XR7FY1

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks