General

  • Target

    0aed451b2eab075d1ef126537b1ac895607b7b722c037ffb72fd490be7291b4e

  • Size

    5.3MB

  • Sample

    240702-2e7j5axdkm

  • MD5

    cd3851a9090b5ab586e5746a70d9f40e

  • SHA1

    ccdf58e8373025a6724be59946101b4ae24a708c

  • SHA256

    0aed451b2eab075d1ef126537b1ac895607b7b722c037ffb72fd490be7291b4e

  • SHA512

    38acdc74c6f7b6560ba51ada918d3f7cf5b6fb3f3f2fc5b0d14fcbdb271f322e254cb89a53eb5d628ee18f1392b3dce56f87c9b03f86eaa26de824847cdbe8fa

  • SSDEEP

    98304:CJAUdjsq3neYbyqz6VF+CV/RiQuBFBbUkm7jcOG2M1Rd7eQxla:1egq3X0FRLeBFBgkmP7GV3EQva

Malware Config

Targets

    • Target

      0aed451b2eab075d1ef126537b1ac895607b7b722c037ffb72fd490be7291b4e

    • Size

      5.3MB

    • MD5

      cd3851a9090b5ab586e5746a70d9f40e

    • SHA1

      ccdf58e8373025a6724be59946101b4ae24a708c

    • SHA256

      0aed451b2eab075d1ef126537b1ac895607b7b722c037ffb72fd490be7291b4e

    • SHA512

      38acdc74c6f7b6560ba51ada918d3f7cf5b6fb3f3f2fc5b0d14fcbdb271f322e254cb89a53eb5d628ee18f1392b3dce56f87c9b03f86eaa26de824847cdbe8fa

    • SSDEEP

      98304:CJAUdjsq3neYbyqz6VF+CV/RiQuBFBbUkm7jcOG2M1Rd7eQxla:1egq3X0FRLeBFBgkmP7GV3EQva

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks