General

  • Target

    5af1a13a69e8312e32344bbc4caee4939b8736daee15ac2153d856b61a206a09

  • Size

    5.1MB

  • Sample

    240701-yfd3eswbrc

  • MD5

    82005f23b2b25c12baef04dbc6826909

  • SHA1

    c0cc90dffc8a95b515da98c1ddf671417c59c038

  • SHA256

    5af1a13a69e8312e32344bbc4caee4939b8736daee15ac2153d856b61a206a09

  • SHA512

    fd72b8291801687ab3d93ae33fb42e1fae27da6bd18533a92ad2ce513a107e9e7593dea9778aca8eabeb256e20462b47d1d3f167632d94b3dbe262f1101e0692

  • SSDEEP

    98304:Cf4etLfRwGzmpnwNE4WrqssC++fLxl/Hj+ii9EPBq4CN+JXrPptclxB4nuNQxy:cdtLJw/pnm9WZsEfL3yi08B4ArXksuN1

Malware Config

Targets

    • Target

      5af1a13a69e8312e32344bbc4caee4939b8736daee15ac2153d856b61a206a09

    • Size

      5.1MB

    • MD5

      82005f23b2b25c12baef04dbc6826909

    • SHA1

      c0cc90dffc8a95b515da98c1ddf671417c59c038

    • SHA256

      5af1a13a69e8312e32344bbc4caee4939b8736daee15ac2153d856b61a206a09

    • SHA512

      fd72b8291801687ab3d93ae33fb42e1fae27da6bd18533a92ad2ce513a107e9e7593dea9778aca8eabeb256e20462b47d1d3f167632d94b3dbe262f1101e0692

    • SSDEEP

      98304:Cf4etLfRwGzmpnwNE4WrqssC++fLxl/Hj+ii9EPBq4CN+JXrPptclxB4nuNQxy:cdtLJw/pnm9WZsEfL3yi08B4ArXksuN1

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks