General

  • Target

    9808985250425d6775a23a4a8bfd7b1b483d85594c2197cd52d72dc3d7030a63

  • Size

    5.2MB

  • Sample

    240701-zerskasckp

  • MD5

    f2322521df10cc628412e6e38c796dda

  • SHA1

    7b9b2b61dc5659acb0eb57bc95d1e92986b67788

  • SHA256

    9808985250425d6775a23a4a8bfd7b1b483d85594c2197cd52d72dc3d7030a63

  • SHA512

    6ff1a00e28bd6ee45a0708071c7fd6cd9ac0efa9eeb289079263a4449a24453ceb08396643bd0f3aa5d0a2e32e656b5975a83e899a46d01433cf5cc51d5fe7cd

  • SSDEEP

    98304:C6WrdJufsWCaZmgLCNepa+o0XvMpJ/FiaEwnBHQQ0+UD/XlP7uty46Wk53pKQxy:urdJufs5ImqMAfspF5nBw71uty46Wkc1

Malware Config

Targets

    • Target

      9808985250425d6775a23a4a8bfd7b1b483d85594c2197cd52d72dc3d7030a63

    • Size

      5.2MB

    • MD5

      f2322521df10cc628412e6e38c796dda

    • SHA1

      7b9b2b61dc5659acb0eb57bc95d1e92986b67788

    • SHA256

      9808985250425d6775a23a4a8bfd7b1b483d85594c2197cd52d72dc3d7030a63

    • SHA512

      6ff1a00e28bd6ee45a0708071c7fd6cd9ac0efa9eeb289079263a4449a24453ceb08396643bd0f3aa5d0a2e32e656b5975a83e899a46d01433cf5cc51d5fe7cd

    • SSDEEP

      98304:C6WrdJufsWCaZmgLCNepa+o0XvMpJ/FiaEwnBHQQ0+UD/XlP7uty46Wk53pKQxy:urdJufs5ImqMAfspF5nBw71uty46Wkc1

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks