General

  • Target

    1ef9a42b5f66d40cef676a7f000a72ef079652fff9e9769c0a6fa93a30c3db05

  • Size

    5.2MB

  • Sample

    240701-z1xkyazdme

  • MD5

    caf4fb3ad5715876f66a7dcaabb4cebd

  • SHA1

    c7e6cdd5ef4edf0adccb19548ea0535321c2d2ed

  • SHA256

    1ef9a42b5f66d40cef676a7f000a72ef079652fff9e9769c0a6fa93a30c3db05

  • SHA512

    7175704aef0b23e393c4cebdfaeac62149137ab475596a0a40fbcd309bf004adde6e115cda43f1bf19a0b40f1da5befee77f08ec5903c1b8d8d5bbbba1cbc9d6

  • SSDEEP

    98304:CnyPU+0Fp0wD4wB6yS/KDyuO5GTySimG94uAuYbKzKINT17+gvx9wJbh+OX5ej37:8yPf0FpR466X8yPgySi99oNGzKINTDvV

Malware Config

Targets

    • Target

      1ef9a42b5f66d40cef676a7f000a72ef079652fff9e9769c0a6fa93a30c3db05

    • Size

      5.2MB

    • MD5

      caf4fb3ad5715876f66a7dcaabb4cebd

    • SHA1

      c7e6cdd5ef4edf0adccb19548ea0535321c2d2ed

    • SHA256

      1ef9a42b5f66d40cef676a7f000a72ef079652fff9e9769c0a6fa93a30c3db05

    • SHA512

      7175704aef0b23e393c4cebdfaeac62149137ab475596a0a40fbcd309bf004adde6e115cda43f1bf19a0b40f1da5befee77f08ec5903c1b8d8d5bbbba1cbc9d6

    • SSDEEP

      98304:CnyPU+0Fp0wD4wB6yS/KDyuO5GTySimG94uAuYbKzKINT17+gvx9wJbh+OX5ej37:8yPf0FpR466X8yPgySi99oNGzKINTDvV

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks